Three Statistics to Help Shape Your Business’ Cybersecurity
Three Statistics to Help Shape Your Business’ Cybersecurity We know it’s not pleasant to think about your organization succumbing to a cybersecurity attack, but it’s a very realistic event that you have to be prepared for. Let’s take a look at the statistics and how exactly they are not in your business’ favor. It helps […]
What Key Things To Look For In A Good Cyber Liability Insurance Policy
What Key Things To Look For In A Good Cyber Liability Insurance Policy As the number of successful cyber attacks continues to grow, so does the need for adequate cyber liability insurance. But what exactly should you look for in a good policy? Here are a few key things to keep in mind. A good […]
Understanding How You Get Malware will Help You Avoid It
Understanding How You Get Malware will Help You Avoid It Malware has plagued anyone using technology for a long time, and while security has certainly gone a long way toward protecting users from malware, so too have the threats grown more powerful and dangerous—especially for businesses. Let’s take a look at some common ways individuals […]
Declining PC Shipments Suggest New Business Computing Models
Declining PC Shipments Suggest New Business Computing Models Building a company’s computing infrastructure is a costly and time-consuming process. Sure, you can purchase new servers; or workstations in bulk, but overall it takes some time to get everything set up and running just how you need it to. PC manufacturers are shipping fewer computers than […]
The Zeppelin Group is Making Us Ramble On About Ransomware
The Zeppelin Group is Making Us Ramble On About Ransomware We apologize for the pun, but we couldn’t help ourselves. When you go about your business and attempt to onboard a new client or implement a new tool for your company, you spend time getting to know what your business is doing and why. Well, […]
How To Spot a Phishing Email
How To Spot a Phishing Email Earlier today I received an email from a contact who works in the private equity field. I met Rob R. at the AM&AA event in Dallas earlier this summer, and we had a great discussion on the importance of technology due diligence during the acquisition process. He asked that […]
Business Technology Challenges to Think About
Business Technology Challenges to Think About Business technology is far from the easiest thing to manage, and it’s mostly because managing technology is not the sole focus of companies (unless you’re us, of course). If you can’t overcome your IT challenges, your business could be held back needlessly. Let’s go over some of the common […]
A Vulnerability in Your Windows Calculator?
A Vulnerability in Your Windows Calculator? Sometimes security breaches and hacking attacks come from the most unlikely of sources, even going so far as to utilize trusted applications to infect an endpoint or network. This is the case with a new phishing attack which uses the Calculator application that comes built-in with Windows in a […]
Bring Out Your Dead (User Accounts)
Bring Out Your Dead (User Accounts) Riverbank Ruminations; Observations from The Banks of The Technology River Tom Evans ~ Ashton Engineer Emeritus Not Dead But Should Be The Dead Collector: “Bring out yer dead.” Large Man with Dead Body: “Here’s one.” The Dead Collector: “That’ll be ninepence.” The Dead Body That Claims It Isn’t: […]
How to Navigate the Modern Threat Landscape
How to Navigate the Modern Threat Landscape Cybercrime is a problem that is only getting worse, and as you might expect, it’s no good for business. It puts your organization in a position where it has to take steps toward securing its infrastructure, whether you like it or not. Let’s go over some of the […]