May 25, 2022 | Backup & Disaster Recovery, Blog, Compliance, Cybersecurity, DragonTech, Managed Services, Password Management
While small businesses and their employees have certainly benefitted from the advancement of technology in recent years, it has also introduced an unprecedented number of cybersecurity risks. Ransomware attacks, for example, hit businesses every 11 seconds in 2021,1...
Jan 17, 2022 | Blog, Compliance, Cybersecurity
What is a Firewall? A firewall is a security software and/or hardware system that monitors the incoming and outgoing traffic from your computer or network, and either allows or blocks those connections based on security rules. Most computers have a basic firewall...
Sep 14, 2021 | Blog, Compliance, Managed Services
A ‘Compliance First’ Mindset Limits Liabilities for SMBs By adopting a Compliance First strategy, when choosing solutions and vendors, you will identify those that do not comply with your requirements, eliminate them from your selection process,...
Aug 23, 2021 | Blog, Cybersecurity, Managed Services
On August 11, 2021, an article was published regarding findings of a ransomware group by the name of ‘Conti’, leveraging the well-known IT management solution Atera as a Command and Control platform. It has been documented that adversaries have leveraged...
Aug 7, 2021 | Blog, Endpoint Detection & Response, Managed Services, Password Management, Remote Monitoring & Management
Briefing on the Colonial Pipeline Attack Below is background and known details of how the pipeline attack was executed, as well as some recommended mitigation tactics for organizations looking to cover their bases. Background The Colonial Pipeline attack, which shut...
Recent Comments