Blog & Resources

How Ransomware Is Evolving

Emboldened by past successes, cybercriminals are launching more targeted attacks and seeking more lucrative payments.

When it comes to ransomware, we may be our own worst enemies. Victimized organizations increasingly choose to pay the ransom in order to regain access to encrypted data — a strategy that appears to be backfiring.

Digital Transformation for SMBs

Smaller organizations are achieving cost savings, productivity gains and competitive advantages by fully leveraging the latest technologies.

New research from TechAisle finds that 51 percent of small to midsize businesses (SMBs) are accelerating their digital transformation initiatives despite the operational and economic impacts of the COVID-19 pandemic.

Pandemic Illustrates Need for New Cybersecurity Philosophy

Network attacks, malware campaigns and phishing scams are on the rise as cybercriminals seek to capitalize on our increased anxiety about the coronavirus pandemic and the lax security measures of at-home workers. According to the FBI, threat reports through the first six months of the year have already surpassed the total for all of 2019, which was widely considered to be the worst year ever for cyberattacks.

Desktop Virtualization

Desktop virtualization can provide secure remote access to applications and data, but the implementation comes with significant challenges.

The need to support work-from-home strategies has renewed interest in desktop virtualization. With virtual desktop infrastructure (VDI), all components of each user’s desktop environment are stored in the data center or the cloud and delivered to the user on nearly any device.

Securing Remote IT Assets

Employers should identify digital assets used by remote employees and establish procedures for disabling access and ensuring their return.

Many people have trouble thinking about the “endgame” at the beginning of a relationship. However, things can (and do) turn sour, particularly in an employment relationship.