Blog & Resources

Webinar – Protect your O365 and G Suite data from malicious deletion, ransomware attacks, and other accidental loss – 21 May 2020

Microsoft or Google can’t determine when a document is deleted whether it was done so intentionally, or if it was accidental or a malicious deletion. When an item is deleted - and that can be anything from a Word Doc or a Google sheet or even an entire folder - its kept in the trash or recycle bin for a period of time, and then purged from the system.

Be Prepared

With attacks on the rise, proper incident response is an essential element of effective cybersecurity.

Following a record year for cyberattacks, industry analysts say security breaches are now virtually inevitable — a matter of “when” not “if.

Expanding Wi-Fi Capacity

FCC opens up more unlicensed wireless spectrum, enabling the game-changing Wi-Fi 6E standard.

Many people working from home due to the COVID-19 pandemic depend upon Wi-Fi to connect their mobile devices. In densely populated areas, they may be competing with their neighbors for wireless spectrum.

6 Tips for Limiting Your Risk of Ransomware Attacks

Much like the coronavirus itself, virus-themed ransomware attacks are spreading relentlessly. However, there are several relatively simple steps you can take to flatten the curve of these malicious campaigns.

Cybercriminals commonly launch attacks designed to play on widespread fear and uncertainty during major world crises.

Tech Support Key to Enabling a Productive Remote Workforce

Providing IT support for telecommuting employees has always been a tricky proposition, but it is particularly challenging now that COVID-19 stay-at-home orders have effectively forced entire companies into work-from-home arrangements.

Even before the current crisis created a surge in telecommuting, remote workers said IT support problems limited their productivity.

Old Threat Makes Comeback

Surge in SQL injection attacks points to the need for intrusion prevention systems to protect applications and sensitive data.

Used by cybercriminals for more than 20 years, SQL injection is one of the oldest forms of web application attacks around.

Enabling Remote Access

Employees working from home need remote access, but what’s the best way to provide it — RDP or VPN?

You can’t blame IT managers for wanting to lock down access to the network, given the endless barrage of sophisticated security threats they must attempt to thwart.

Just released our free eBook, 20 Signs That Your Business is Ready for Managed ServicesDownload
+