Everyone is familiar with, or has heard of, ransomware. It has been around in some fashion since 1989, with notable resurgence in 2005 and 2013. The original idea was to extort money from the victims by gaining access to their systems and encrypting...
Are Ransomware Attacks Data Breaches?
That’s A Wrap - 2020 Business and IT Leadership Symposium
We did it. After eight amazing weeks, we finally finished our third-annual Business & IT Leadership Symposium. Our goal every year is to bring together brilliant industry leaders of all verticals to share experiences and learn about the things that...
Sound Digital Security Practices for Companies
Advancements in technology have made things easier for businesses, but as modern companies put more and more of their infrastructure online, they become easier to attack. Digital business data, personal employee information and proprietary customer...
A Conversation Every CEO Should Have with Their IT Staff
I’ve never seen an IT department that didn’t have some secrets. I’m not talking about the root password here. I’m talking about skeletons in the closet…the kind that make systems managers lose sleep.
What Is Vulnerability Scanning And Why Is It Important?
What was the last company you heard about that got hacked? Do you know how the attackers got in? Oftentimes the first step in an attack is to scan the victim's systems for vulnerabilities to exploit. Modern organizations need to regularly evaluate...