BLOG

Stay up-to-date with news and stories from Kontinuum.

Mitigating cyber-security insider threats
Mitigating cyber-security insider threats.
Did you know that in some industries the biggest cyber-security threats come from inside a breached organization? Sometimes it’s motivated by financial gain and sometimes...
Identity and access management 101
Identity and access management 101.
Whether it be cloud, mobile, or on-premises, every technology you use stores confidential data that are accessed by your employees. So how do you guarantee...
office 365 blog
Office 365 add-ons that boost productivity.
Microsoft’s Office 365 has made everyday business operations more efficient with programs like Word, PowerPoint, Excel, OneNote, and Outlook. As if that’s not enough, it...
Copy of Copy of Kontinuum Podcast Cover V2 (4)
Winning the lost battle.
This transcript taken is from Episode 6. Winning the lost battle. Shiva Maharaj 0:00 This is the cybersecurity amplified and intensified podcast. So what's on...
netwalker
Government Technology Service Provider (TSP) data for sale on the dark web by Netwalker.
This morning our colleagues over at IT Simplified and I were having a conversation about a Technology Service Provider (TSP) whose data is available for...
171013-How-to-Detect-and-Prevent-Ransomware-Attacks
Ransomware is progress.
From the beginning of time, data has been the most valuable asset. Money, gold, diamonds and anything we've place a value on were merely  constructs...
Backup verification
Do your back-ups work?
Last Friday we asked if your back-ups work. Many answered saying their in fact have back-ups. To be clear, we were asking if your back-ups...
Ransomware Report Map
Understanding ransomware.
Before you can defend against an adversary, you have to understand them. While tactics may change, the end goals are usually the same. This post...
Safety_-by-Margaret-Garrett
When we do I.T., it’s art in motion.
The future is here, are you ready? I challenge the status quo to disagree that mobility and remote workers don't present the identical security concerns...
Honesty is an expensive gift
Honesty is an expensive gift.
All too often, price is the defining factor in our industry without considering the opportunity cost of lesser solutions. After all, it almost always comes...
Kontinuum Security Alert
Government & Solarwinds Cyber Attack
Kontinuum is aware of the Solarwinds Cyber Attack security incident impacting numerous government departments in the United States and abroad. The Solarwinds Cyber Attack security...
infosec
Going I.T. alone?
Your current situation. You have a guy that does your I.T. or one of your employees has been saddled with the responsibility. And this "guy"...
How can we be of service to you
How can we be of service to you?
Relationships are everything in life. We’ve been lucky to have created unique and lasting relationships with people and organizations from all walks of life around...

GOING IT ALONE,
HAVE YOU FEELING OVERWHELMED?

Every day, our clients rely on Kontinuum to deliver the Peace of Mind that their technology will work how they need it to, when they need it to.

kontinuum blue white
About us

Creating Peace of Mind® – it's why we exist. Every member of our team lives our Core Purpose and understands what it means to our clients and our own success. 

Quick Links​
  • Home

  • Expertly Managed

  • Professional Services

  • Contact

  • Support

Company
  • About

  • Blog

  • Podcast

  • Privacy Policy

  • Refund Policy

  • Terms & Conditions

  • Status

Connect