With so much news on cyber attacks and with cyber criminals becoming increasingly creative with their methods, companies are looking for ways to out-clever the fox, so to speak.
Category Archives: Tech Blog
2FA or MFA – That is the Question
We cover two of the most common methods to enhance the security of password protected resources.
Backup for Business
As an IT service provider, one of the greatest joys that we can experience is that of recovering a client from the brink of disaster by having had a good backup and restore the system in place.
Social Engineering Attacks in an Age of Artificial Intelligence
Advances in AI and Software Engineering will force cyber-criminals to focus on “soft” targets, here are a few ways to mitigate those risks.
SamSam Ransomware Alert
On Monday, December 3, the FBI and Department of Homeland Security (DHS) issued an alert for SamSam ransomware—also known as MSIL/SAMAS.A—after identifying certain cyber threat actors using the ransomware to target industries in the United States and worldwide.
In this post, we cover the breaking news and what MSPs should take note of, how the SamSam ransomware works, and what you can do to protect against it.