Is Your Organization Vulnerable to a Ransomware Attack?

Posted on November 16, 2021 by Chris Ripkey

Ransomware is currently headline news and rightly so. Technology professionals around the globe have observed recent spikes in this form of cybercrime with alarm. The sheer volume of ransomware attacks in the first six months of 2021 is said to have eclipsed the 12-month total for 2020 and show little sign of slowing.

Read More

13 Steps to Incident Response Success

Posted on October 28, 2021 by Vito Nozza

I’ve been known to use quotes to inspire or strengthen my message, so here goes: “The sky is falling, the sky is falling” (The Remarkable Story of Chicken Little, 1840). Believe it or not, this Chicken Little quote has significance to businesses: If you are not ready for incidents, individuals will go into a panic and act like the sky is falling. Preventing this is the main focus of an incident response plan (IRP), which takes control of events that could cause catastrophic harm to your organization in advance so that you do not panic when they actually occur.

Read More

Well, a Disaster Happened. Now What?

Posted on October 19, 2021 by Vito Nozza

Disasters. They can mean different things to different companies. One company might be scrambling without any sense of direction during a malware attack; another company might be as cool as a cucumber. The difference is having a plan in place and the right personnel to help fulfill it. Franz Kafka, a major figure in 20th-century literature, stated, “Better to have and not need than to need and not have.”

Read More

Business Continuity: Are You Sure You’re Ready?

Posted on October 14, 2021 by Vito Nozza

Oscar Wilde once stated, “To expect the unexpected shows a thoroughly modern intellect.” In continuing our look into being prepared during Cybersecurity Awareness Month, our second installment will focus on business continuity, what it entails, and the ongoing process to ensure it doesn’t become a "set it and forget it.”

Read More

Is Your Data Worth Protecting At All Costs?

Posted on October 30, 2018 by Kuljit Sangha

When it comes to protecting your data, having a single strategy is often not enough. To combat the many different types of threats to your data, you should be prepared with a variety of means to protect your data. This begins with each business unit internally understanding its Recovery Time Objective (RTO), Recovery Point Objective (RPO), and availability needs. Once these items have been documented, we can determine which data protection strategies are the best fit for your environment.

Read More