Apr 13, 2023 | Blog, cybersecurity, Featured, General Interest, Security, Technology
Cybersecurity is most effective when approached in a layered or tiered manner. The Center for Internet Security (CIS) currently has 20 controls published and split between three main categories: Basic, Functional, and Organizational. These 20 controls can be layered...
Apr 11, 2023 | "As a Service", Blog, Compliance, Electronic Health Records, Employees, Security
Compliance consists of a framework of rules, regulations, and practices that need to be followed. There can be corporate compliance that is enforced through technology, however, many compliance guidelines enforced by IT are regulatory. What is Regulatory Compliance?...
Apr 6, 2023 | Blog, cybersecurity, Security
Cyber criminals are always on the lookout for their next big payday. A common exploit used by cyber criminals is looking for vulnerabilities in various software applications. The term zero-day refers to how many days a vendor or developer should take to correct a flaw...
Mar 30, 2023 | Business Advice, cybersecurity, News, Ransomware, Security, Technology Tips, Threat Detection
With cyber attacks on the rise, detecting threats before suffering a large-scale issue is the correct way to effectively protect a business’ data and reputation. Managed Detection and Response (MDR) services are the best way to catch cyber criminals in the act. This...
Feb 20, 2023 | Blog, Data Breach, General Interest, Recent News, Security, Technology, Technology News
Russian search engine Yandex offers a slew of online services to replace Google, Netflix, Spotify, Amazon, and Uber. However, a recent Yandex data leak contains nearly 50 gigabytes of data with leaked files, including information ranging from API (application...
Feb 18, 2023 | Blog, General Interest, Ransomware, Recent News, Security, Technology, Technology News
Schools in Tucson, AZ, and Nantucket, MA, became the most recent targets of cyberattacks within hours of each other during the last week of January. The two attacks appear to be unrelated. The hackers behind the Tucson Unified District ransomware attack specifically...