Security
This morning our colleagues over at IT Simplified and I were having a conversation about a Technology Service Provider (TSP) whose data is available for sale in about 12 days on the dark web. This company per their website provides services to the government from across its multiple locations in VA, an area with many […]
Read MoreFrom the beginning of time, data has been the most valuable asset. Money, gold, diamonds and anything we’ve place a value on were merely constructs created to trade for this data. Just so happens, Ransomware is today’s construct. Created to conceal data theft, because what was once your data, will be sold. Do you understand […]
Read MoreBefore you can defend against an adversary, you have to understand them. While tactics may change, the end goals are usually the same. This post is the beginning of a series of writings on the effects and potential mitigations of ransomware. Kontinuum Expertly Managed subscriptions help to mitigate the occurrence and effects of a ransomware […]
Read MoreThe future is here, are you ready? I challenge the status quo to disagree that mobility and remote workers don’t present the identical security concerns as those working in the confines of the “office”. Oh, you have security in place? That’s cute. Have the steps you’ve taken towards your little version of security been reactive […]
Read MoreAll too often, price is the defining factor in our industry without considering the opportunity cost of lesser solutions. After all, it almost always comes down to money. What does this mean to you and why should you care? Eight plus months ago you went remote, your ability to Work From Home (WFH) was put […]
Read MoreIn these uncertain times, we must all be vigilant. Moments ago I received this text message from something purporting to be “Chase”. ARROW 1: The first things that stood out was the the url www[.]mobile05-chase[.]net This is a fragmented URL, which means they are hoping you focus on the last bit chase dot net and […]
Read MoreFear mongering and cautious optimism have likely been the drivers behind IT expenditure in recent weeks. I’d wager few of those dollars were allocated to securing this “new work from home” bug that has bitten everyone. Aside from the health risks, COVID-19/Coronavirus has demonstrated and/or revealed the wanton disregard for IT security in the global workplace. No […]
Read MoreSo, you signed a contract that includes proactive monitoring. Great, you’re now one step ahead than the rest, or are you? To most Managed Services Providers, this proactive monitoring is limited to canned “sensors” that look at your hardware for low disk space, fans spinning too much and checking what features may be installed. What […]
Read More