Cyber Threats Underscore Importance of World Backup Day

Thirty-five years ago, the very first piece of malware came into existence. Created by a 15-year old programmer named Rich Skrenta, “Elk Cloner” was a boot sector virus that targeted the Apple II and spread via floppy disk. A fun prank at the time, Skrenta’s creation would serve as the inspiration for the malicious malware peddled by today’s cybercriminals. With the celebration of World Backup Day on March 31, read on as we detail the importance of protecting your business from malware attacks and why a managed backup solution is the best security option for your data.   At its core, malware is a category of malicious code. According to…

Why Businesses Should Embrace Cloud Complexities, Not Fear Them

As the grey overcast of winter gives way to the fine sunshine of spring, the one cloud that remains constant throughout any season has little to do with the weather. A recent survey revealed fears of complexity and a lack of in-house tech skills as deterrents to many businesses considering a migration of their operations to the cloud. Read on as we break down the cloud stigma and detail the rewards of a cloud migration.     When we speak of “cloud” computing, we’re really talking about computing based on the internet. Where in years past, users would run programs or applications from software downloaded on a physical computer or…

Internet of Things

Vault 7 Leaks Underscore Insecurity of the Internet of Things

The cybersecurity world was rocked this week by the news of another round of released documents from the international non-profit WikiLeaks, an organization notorious for release of sensitive and oftentimes top secret government documents and information. This latest round of leaks, dubbed “Vault 7”, highlighted the continued vulnerability of devices within the Internet of Things (IoT) to acts of hacking and espionage. Read on as we detail what the information from this latest round of leaks means for the future of cybersecurity and the IoT.     The leaked documents in question, known simply as “Vault 7,” are claimed by WikiLeaks to represent internal memos and directives of the Central…

Duplicate Security

Duplicate Security: The Importance of Managed Backup Solutions

What would you do if you lost everything? On August 3, 2012, journalist Mat Honan’s entire digital life was destroyed. Hackers broke into his iCloud account, remotely wiping his computer, phone and tablet, obliterating all his data. If you think your data is immune to attack, you may want to think again. While four in five people own either a computer or mobile phone, only one in four regularly backs up their data. While backing up data is important for individuals, the same applies to business as well. Read on as we detail how a managed data backup solutions can mean the difference in your business’s future survival.    …

Improve Network Security

How Local Governments Can Improve Network Security

Our daily life, economic vitality, and national security depend on a safe and stable cyberspace. That said, our nation’s very security and its underlying infrastructure are vulnerable to a wide range of risks stemming from a multitude of cybersecurity threats. Despite their seemingly lower profile, local governments and municipalities are especially vulnerable to such threats. These public entities face attack from bad actors like black hat hackers and nation-states looking to exploit network vulnerabilities to steal information and money. Read on as we detail the threats governments and public entities face and how to better prepare for them.     As today’s world becomes increasingly digitized, the cybersecurity conversation now…