[vc_row][vc_column][vc_column_text]Passwords are incredibly important, which is why almost EVERYTHING you access requires them. They are the first line of defense to your data. Best practices for password creation tell us to include a combination of lower and upper...
Network Security
Medium Sized Businesses Targeted Due to Poor Network Security
[vc_row][vc_column][vc_column_text]Hackers, like the viruses they create, adapt at alarming rates. The newest adaptation involves a focus shift to medium sized businesses for cyber attacks. Big companies have the budget to install top line security measures and full...
Top 5 Best Practices for Network Security
[vc_row][vc_column][vc_column_text] The web we create with the introduction of newer, better technology is a tangled one. In a business setting, we not only have internal servers, but we operate on the cloud as well. We have BYOD (Bring Your Own Device) work...
Second Hospital Network Security Breach by Ransomware in Just Two Months
[vc_row][vc_column][vc_column_text] Data Backup and Recovery Saved this Hospital from Paying the Ransom A Hospital in Henderson, Kentucky is the second victim of a ransomware attack in the last two months. The first attack using the same ransomware, called Locky, took...
Hospital Pays Ransom to Hackers in Network Security Breach
[vc_row][vc_column][vc_column_text]Earlier this month, A California hospital's IT systems were taken hostage for an entire week. The hackers inserted ransomware into the hospital's network causing them to lose control of all of their IT systems and demanded $17,000 in...
BYOD: Companies are inviting staff to bring their own computer to work
[vc_row][vc_column][vc_column_text]What is BYOD? Bring Your Own Device (BYOD) is a growing trend that is helping many businesses to expand their worktime coverage and reduce costs. The concept is simple: rather than employees only using business owned computers and...