CentOS Linux Version 8 On Windows Subsystem for Linux

We will look at setting up CentOS version 8 on Windows Subsystem for Linux (WSL). Due to certain issues with the Microsoft Store licensing there is not an officially supported and free version of CentOS available the way Ubuntu Linux is. We will...

Are Ransomware Attacks Data Breaches?

Everyone is familiar with, or has heard of, ransomware. It has been around in some fashion since 1989, with notable resurgence in 2005 and 2013. The original idea was to extort money from the victims by gaining access to their systems and encrypting...

Sound Digital Security Practices for Companies

Advancements in technology have made things easier for businesses, but as modern companies put more and more of their infrastructure online, they become easier to attack. Digital business data, personal employee information and proprietary customer...

A Conversation Every CEO Should Have with Their IT Staff

I’ve never seen an IT department that didn’t have some secrets. I’m not talking about the root password here. I’m talking about skeletons in the closet…the kind that make systems managers lose sleep.

What Is Vulnerability Scanning And Why Is It Important?

What was the last company you heard about that got hacked? Do you know how the attackers got in? Oftentimes the first step in an attack is to scan the victim's systems for vulnerabilities to exploit. Modern organizations need to regularly evaluate...

Subscribe Here For Our Blogs:

Recent Posts

Categories

see all