1.888.749.9800

Monthly Archives: February 2018

  • Permalink Gallery

    The Shift that EternalBlue May Have Caused Within IT Leadership

The Shift that EternalBlue May Have Caused Within IT Leadership

For leaders in IT, 2017 has been the year of EternalBlue (the weaponized version of the vulnerability described in MS17-010), whether they know it or not.  EternalBlue allowed the trivial exploitation of Microsoft systems allowing an attacker to gain the highest level of system permissions.  This sort of vulnerability set the hacking community on fire and allowed […]

By |February 26th, 2018|Blog|Comments Off on The Shift that EternalBlue May Have Caused Within IT Leadership

How to Prevent a Ransomware Attack

It is always better to be proactively prepared and prevent ransomware attacks than having to react after an attack occurs. Paying the ransom is not recommended.

Law enforcement and IT Security companies have joined forces to disrupt cybercriminal businesses with ransomware connections. The “No More Ransom” website is an initiative by […]

By |February 16th, 2018|Blog, Security Breach|Comments Off on How to Prevent a Ransomware Attack
  • Permalink Gallery

    How to Ensure the Security of Your Cloud Storage in 2018: The Top Experts Speak

How to Ensure the Security of Your Cloud Storage in 2018: The Top Experts Speak

by Megan Thudium, writer, IT Security Central, January 25, 2018

We’ve heard of the challenges of Amazon S3 Buckets and the exposure of customer data to the world wide web. When cloud storage technology emerged, the new technology had plenty of hype. Companies flocked to the new technology, and they started integrating it into their daily work structure. However, […]

By |February 5th, 2018|News & Events|Comments Off on How to Ensure the Security of Your Cloud Storage in 2018: The Top Experts Speak