by Christine Thome | Aug 7, 2019 | Networking, Security
Why does “provide guest access” always feel like a no-win situation? You have to give untrusted clients access to your managed network. You have to provide an easy workflow to approve and allow visitor devices a connection to your SSID. You have to carve out IP...
by Christine Thome | Aug 7, 2019 | mobile threats, Security
The expanding cyber threat landscape puts organizations at more risk of being attacked than ever before. As a result, enterprises must constantly monitor the threat landscape and be ready to respond to security incidents, data breaches, and cyberthreats when they...
by Christine Thome | Jul 10, 2019 | Networking, Security
If you’re making technology improvements to get an edge over the competition, or just adding an online CRM service or collaboration tool to boost productivity, the unpleasant side effect is they can leave you vulnerable to cyberattacks. A single network security...
by Christine Thome | Jul 10, 2019 | Backup, Security, Storage
Data backups are the last line of defense from paying a ransom or suffering the loss of criminally encrypted or otherwise destroyed data. Here are a few tips to make sure you’re getting everything you can from your backup process. Know Your Business Data...
by Christine Thome | Jun 11, 2019 | Backup, Infrastructure, Security, Storage
The frequent headlines around spear phishing and ransomware serve as regular reminders that data protection is critical to a business. The City of Baltimore, Oklahoma City Public School, and Wolverine Solutions Group are just a few of the organizations that have...
by Christine Thome | Jun 11, 2019 | Backup, Security
Editors Note: This blog is a work of fiction/humor and was originally published as such on the Cylance ThreatVector Blog, May 24, 2019, by Tag Cyber. To Our Compromised Customers: Our team at (insert company name) tried to secure its computer systems behind an...