by Bob Martin | May 31, 2016 | Network Security
Passwords are incredibly important, which is why almost EVERYTHING you access requires them. They are the first line of defense to your data. Best practices for password creation tell us to include a combination of lower and upper case letters, numbers, and special...
by Bob Martin | Apr 25, 2016 | Network Security
Hackers, like the viruses they create, adapt at alarming rates. The newest adaptation involves a focus shift to medium sized businesses for cyber attacks. Big companies have the budget to install top line security measures and full IT staffs to oversee them. Medium...
by Bob Martin | Apr 7, 2016 | Disaster Recovery, IT security, Network Security
The web we create with the introduction of newer, better technology is a tangled one. In a business setting, we not only have internal servers, but we operate on the cloud as well. We have BYOD (Bring Your Own Device) work environments where our staff are using their...
by Bob Martin | Mar 25, 2016 | Network Security
Data Backup and Recovery Saved this Hospital from Paying the Ransom A Hospital in Henderson, Kentucky is the second victim of a ransomware attack in the last two months. The first attack using the same ransomware, called Locky, took place in California several weeks...
by Bob Martin | Mar 1, 2016 | Network Security
Earlier this month, A California hospital’s IT systems were taken hostage for an entire week. The hackers inserted ransomware into the hospital’s network causing them to lose control of all of their IT systems and demanded $17,000 in bitcoin to release...
by Bob Martin | May 8, 2015 | BYOD, Cloud Computing, Network Security
What is BYOD? Bring Your Own Device (BYOD) is a growing trend that is helping many businesses to expand their worktime coverage and reduce costs. The concept is simple: rather than employees only using business owned computers and mobile phones, they configure their...