The Tek > Blogs
X

Blogs

Sign up for our Newsletter
Name

By By Rick Miller - In the history of our democracy, we have never had a more open, free, and unregulated system of information and communication than the internet. The industrial revolution pales in comparison to the global impact of technology on an unexpecting world. Like all world-changing advances, the internet and all its associated technology has created astonishing benefits and unmatched threats.
Read More
The most interesting statistic to come out of the cyber security market in the last couple of years is also one of the most overlooked. This statistic points to one of the most obvious problems facing cyber security experts today. It is also one of the most affordable and easiest problems to fix. So what is this statistic? It involves your people and an activity they do at work every day. Read more lo learn: 10 ways to avoid phishing scams
Read More
As a cybersecurity professional, you are the guardian of data, the gate keeper, and the architect of defense. You live on the front lines of a digital battle against invisible enemies and advanced persistent threats. 
Read More
The cybersecurity landscape changes every day, with new actors, new threats, new schemes, and new ways to infiltrate websites, emails, devices, and almost anything that is connected to the internet. We’re constantly reading about the rise of spear phishing, DDoS attacks, global malware threats, ransomware, CEO fraud, and more.
Read More
You just clicked on a link that contained malware. Your computer screen turns red. You are the victim of a Ransomware attack. All of your data has been locked down. You can’t access any of your systems. Your company is completely shut down. You need to restore your data and get your company back up and running. Every minute means lost revenue and production. Fortunately, you have a back-up plan. Your back-ups are valid, you restore your data and you are back on-line.
Read More
Did you know that 140,000 disk drives crash per week in the U.S.?  That’s a lot of lost data! Are you prepared for a data loss incident? Are malware and ransomware a concern to you? Do you have a backup strategy in place? Is your backup strategy reliable enough to get you back up and running in a critical situation? ......
Read More
As you head into the office, you’re not thinking about backing up the data on your computer. Instead, your focus is on navigating rush hour traffic and listening to the news. But then you hear that the area rivers are starting to overflow their banks. You think about it for a moment; and hope everyone is ok. Until... ....
Read More
We had a client that needed a conference room TV that was fast and portable. This was our solution.
Read More
“The next Pearl Harbor will be Cyber! It’s a cheap way to attack! No bombers or submarines needed. We must do much more to protect our infrastructure from attack. ” - Senator Angus King, Maine. The idea that we must protect our businesses from a dark nefarious shadowy threat that lurks beneath the surface of the Internet paints a scary picture of the threat we all face. ......
Read More
“In the most widespread attack to date, the WannaCryptor (WannaCry) ransomware family infected thousands of computers across the world. In just 24 hours, the number of infections spiked to 185,000 machines in more than 100 countries."  * picture from KnowBe4 A new family of ransomware called WannaCryptor has started targeting businesses in more than 70 countries around the world. Hospitals, telecom companies or gas and utilities plants are just some of the verticals tha...
Read More
Page 1 of 4 FirstPrevious [1]234 Last