The city of Atlanta is still feeling the effects of a March ransomware attack that disrupted city government operations for days. News reports indicate that the city has already spent more than $2 million cleaning up from the “SamSam” virus attack, and city officials have estimated that they may need another $10 million over the next year.
Hackers Increasingly Target Cities and Towns
Before You Let Business Partners Access Your IT Systems, Know the Risks
It’s not uncommon for organizations to provide business partners and vendors with access to IT systems and data. In some cases, a partner could be storing the other organization’s sensitive data. The assumption is that the third party will act responsibly, but that’s far from guaranteed.
Why Identity Management Is Critical to Securing Today’s Networks
There was a time when a “Great Wall of China” approach to IT security was sufficient. Just focus your resources at the network perimeter to keep invaders out. As long as nobody leaves the kingdom, you’re good to go. Unfortunately, IT resources have jumped the wall, so to speak, thanks to the cloud and mobile.
Proper Planning Is Essential for Effective Wi-Fi
As wireless demands continue to increase, the focus of wireless LAN design is shifting from coverage to capacity. In other words, simply providing basic coverage in a defined service area is no longer sufficient. Organizations need to ensure that their Wi-Fi supports the current and future capacity and performance levels required by an increasingly mobile workforce.
Reducing Risk Begins with a Cybersecurity Threat Assessment
No organization on the face of the earth is immune to a data breach. Some organizations are more prepared than others to detect and prevent attacks. Some are more prepared to respond to attacks and minimize the damage. But make no mistake, every organization is at risk.
Create a Layered Defense with WatchGuard Solutions
Botnets, ransomware and phishing attacks are the top threats to businesses, according to the latest Microsoft Security Intelligence Report. Although there is some overlap — ransomware, for example, is usually distributed through botnets and phishing attacks — these are nonetheless distinctive threats requiring multiple countermeasures.
Preparation is Essential for SMB Cloud Success
Small to midsize businesses (SMBs) can improve market access, cash flow and profitability by more than 300 percent as a result of the “dexterity and flexibility” enabled by adoption of cloud technology, according to a new study from Microsoft and the Thought Arbitrage Research Institute.
You Can’t Get There from Here — Now What?
As we head into the 2018 hurricane season, it’s time once again to evaluate your organization’s preparedness. Business continuity (BC) and disaster recovery (DR) planning involves more than just technology — your primary objectives are to ensure the safety of your people and your facilities.
GDPR Deadline Exposes Data Governance Weaknesses
The European Union’s General Data Protection Regulation (GDPR) went into effect in May. Although it is widely considered to be among the most strict data privacy laws ever enacted, few organizations have made proper preparations. Ninety-three percent of global organizations surveyed in April by the business analytics company SAS said they are not yet fully GDPR compliant.
Remote Monitoring and Management Speeds Problem Resolution
Given the critical nature of today’s IT systems and networks, the traditional break-fix service model is inching closer to obsolescence. The speed of business requires a more proactive approach to problem resolution, which is why remote management and monitoring (RMM) solutions have become essential.