We cover two of the most common methods to enhance the security of password protected resources.
Category Archives: Blog
Backup for Business
As an IT service provider, one of the greatest joys that we can experience is that of recovering a client from the brink of disaster by having had a good backup and restore the system in place.
Social Engineering Attacks in an Age of Artificial Intelligence
Advances in AI and Software Engineering will force cyber-criminals to focus on “soft” targets, here are a few ways to mitigate those risks.
SamSam Ransomware Alert
On Monday, December 3, the FBI and Department of Homeland Security (DHS) issued an alert for SamSam ransomware—also known as MSIL/SAMAS.A—after identifying certain cyber threat actors using the ransomware to target industries in the United States and worldwide.
In this post, we cover the breaking news and what MSPs should take note of, how the SamSam ransomware works, and what you can do to protect against it.
Which Data Loss Gremlin are you?
Meet the Data Loss Gremlins and discover which which one you are. Take this quiz and find out!