An Honest Approach to the Post-Breach Letter

Editors Note: This blog is a work of fiction/humor and was originally published as such on the Cylance ThreatVector Blog, May 24, 2019, by Tag Cyber.   To Our Compromised Customers: Our team at (insert company name) tried to secure its computer systems behind an...

World Backup Day

Originally published on the Barracuda Blog, March 26, 2019, by Christine Berry Data breaches are everywhere, and no company is immune from the automated and persistent attacks from all over the world.  It’s not difficult to keep up with the news on the larger...

IT Resolutions

Unlike resolutions to lose weight, join a gym or become a gourmet chef, these seven IT resolutions are easy to implement and maintain. Plus, these will benefit you a lot more than that Sea Urchin Guacamole Tacos recipe you were contemplating.  I promise. Automate More...

Disaster Recovery Testing and How to Get it Right

Originally published on the Arcserve Insight Blog, by Mark Johnson, May 30, 2018 Will your disaster recovery plan see you through ransomware attacks, hardware failures, and natural disasters—or will you be caught flat-footed? If you can’t answer that question with an...