Blog

Creating an Airgap for Data Security

Creating an Airgap for Data Security

As a business owner, ensuring your organization can survive a crisis is likely top of mind for you. And, there’s a good chance you’ve already thought about disaster recovery and business continuity in some ways.

With more and more frequency, those concerns relate to data security and can be manifested by way of an internal event (such as human error or a disgruntled employee), as well as an externally generated event (such as a cyber-attack or natural disaster).

Have you considered how the cloud fits into a data disaster recovery plan?

The cloud’s greatest strength is its ability to provide on-demand infrastructure.

Virtualization is different from the cloud

Virtualization is different from the cloud

Virtualization and cloud computing can be confusing, especially to business owners who are not familiar with them. But when you understand their differences, you’ll be able to best take advantage of these technologies. Virtualization Imagine a company with five servers, each assigned a single task such as storage, email, etc. If there were a spike […]

7 Questions about the Cloud

7 Questions about the Cloud

1. What is the “cloud”?
The most basic definition is that it’s making use of someone else’s computer resources. Essentially, users place their data and applications on compute and data storage hardware managed by a third party, which makes this information available to authorized users over the Internet.

Think your password is secure? Think again

Think your password is secure? Think again

A password policy designed for federal agencies must be secure, right? Surprisingly, that hasn’t been the case, according to the National Institute of Standards and Technology (NIST). The NIST created many of the password best practices you probably loathe — the combination of letters, numbers, and special characters — but it now says those guidelines […]

Disaster recovery myths you can dismiss

Disaster recovery myths you can dismiss

Technology changes so rapidly. With disaster recovery (DR), we see business owners clinging to ideas that no longer apply. What kind of DR myths are still widely accepted by the masses? Here are three that need to be retired immediately.  Tape backups are the best DR solution Backup tapes are physical objects that deteriorate over […]

Phishers use encrypted sites to scam

Phishers use encrypted sites to scam

Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. This means some fraudulent sites may have HTTPS on their address, giving users a false sense of security. How hackers use encryption […]

How HIPAA wards off ransomware threats

How HIPAA wards off ransomware threats

Hospitals and healthcare organizations are usually the first victims of malware attacks. WannaCry ransomware — malicious software that encrypts files until the victim decides to pay the Bitcoin ransom — took advantage of this when it hit several healthcare institutions last month. With more malware expected to target the healthcare industry this year, following HIPAA […]

The phishing craze that’s blindsiding users

The phishing craze that’s blindsiding users

Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may get caught up in the most recent scam. Take a look at our advice […]