Blogs

New developments, innovations, and reporting from around the IT sector

Ransomware Demands Skyrocket

GREEDY CYBER CRIMINALS AND THEIR RISING COSTS
It doesn’t seem that long ago that ransomware attacks became a premier choice for hackers and scam artists. One attack I vividly remember from the early days of ransomware was around 2012, when we helped a local Pittsburgh client with a locked-up computer that had been frozen with ransomware.

Superhero or Single Point of Failure?

The Dangers of Asking Your Sole IT Support Technician to be Your Superhero
As the old saying goes, “Hope is not a strategy.” But for many organizations, hope is the strategy when it comes to their technical support staffing.

At a large number of organizations, IT staff members are often asked to take on “superhero  support”  measures  to keep  the  applications available 24/7. This could mean they work late nights and into the early morning to maintain the company’s critical functioning systems and drag themselves into work the next day.

What is SD-WAN?

An application of software-defined networking (SDN) that is applied to WAN connections and used to connect enterprise locations across vast geographic distances. It connects branch offices, data centers, and other business sites to a central corporate network, using a software approach.

SD WAN

Organizations have become so dependent on technology that when applications become unavailable, we often see employees pack it in and go home for the day. 
Most all organizations have become extremely technology centric relying on the availability of business critical cloud/SaaS applications, email, voice/video collaboration, web access and more.

An Overview Of Penetration Testing

Penetration Testing is a Critical Part of Any Cyber Security Program
An Overview Of Penetration Testing
Penetration testing provides an accurate evaluation of your organization’s risk for data breach.

Penetration Testing means a test methodology in which assessors attempt to circumvent or defeat the security controls of an organization’s IT systems and networks.