On July 23rd, Garmin fell victim to a cybercriminal attack. A lot of the specific details of the attack are not confirmed. It is believed that the Russian cybercriminal group, Evil Corp, attacked Garmin with WasteLocker ransomware, encrypting their files
IT professionals often advise business owners to train their employees on the importance of cybersecurity because your employees can be the largest security loophole in your business. Now that the COVID-19 pandemic has forced many businesses to transition to work
For some time now, we’ve been talking about working with a trusted I.T. resource to handle your technology. We’ve discussed augmenting your team when needed, and pairing your internal staff with an external resource. But there’s something you don’t need
Many companies like the idea of having a single internal IT manager; it means their technology needs can be addressed in-house, which supposedly relieves stress and resolves problems quickly. This often isn’t the case.
Recent events have exposed the shortfalls of relying on a single internal IT manager; they just don’t have the resources to manage all of your technology solutions. As a result, they become overworked and overwhelmed, which further impacts the quality of their work.
The current pandemic has slowed the world to a crawl. Wall Street has been hit hard. People are no longer going out. We’re told to quarantine, self-isolate, and not engage in groups. You know who hasn’t slowed down? Cybercriminals. In
The world is wracked by various fears right now. What are some ways we can push past it, and grow?
We frequently meet with small to medium size clients that believe their business is too small or unimportant to be targeted by cybercriminals, after all, there are bigger targets for hackers, right? Wrong. In truth, every business, large or small,
The coronavirus (COVID-19) outbreak is causing businesses around the world to reexamine their operational structure.
The security of our organization depends upon you, the human firewall. You help prevent security events and control the input and output of sensitive information by exhibiting these five traits.