Is Your Backup and Restore Strategy Putting Data at Risk of an Attack?

August 01, 2022

Backing up your critical data should be a fundamental part of every data protection strategy. With ransomware breaches and recovery costs nearly doubling over the last year, at 66% up from 37% and $1.85M up from $760K respectively, organizations cited data backups as the #1 method used to restore compromised data.

Read More »

Cybersecurity, IT Solutions & Support, Cloud Security

Critical Reasons You Must Enable Multi-Factor Authentication (MFA)

July 28, 2022

For years now, multi-factor authentication (MFA) has been at the top of the cybersecurity best practices list. MFA has proven to curb data breaches due to compromised credentials (usernames and passwords), and according to Microsoft, 99.9% of cyber-attacks on company accounts are preventable with properly deployed MFA. This is a statistic no business leader can afford to ignore.

Read More »

Cybersecurity, Cloud Security

8 Reasons to Conduct a Cybersecurity Risk Assessment

July 14, 2022

The rate of technology change is accelerating, along with the number of attack surfaces within a company environment. At no time was the acceleration more evident than during the height of the pandemic. Many companies had to adapt and invest in technology to simply keep operating.

Read More »


SECURITY BULLETIN: Mitel MiConnect VOIP Zero-Day Vulnerability

June 28, 2022

Several cybersecurity research groups have identified and studied the use of a Zero-Day vulnerability found in the Mitel VoIP MiConnect solution, CVE-2022-29499. The vulnerability exists due to improper input validation in the Mitel Service Appliance. A cyberattacker can send a specially crafted HTTP GET request to the application and execute arbitrary Operating System commands on the target system. Successful exploitation of this flaw may result in the complete compromise of the vulnerable system. This vulnerability has been successfully exploited by at least one ransomware group.

Read More »

Security Bulletins & Alerts

Data Breach: 5 Critical Questions Answered

June 13, 2022

Since 2008, Verizon has released its annual Data Breach Investigations Report (DBIR). This is a data-driven report on threats your organization may encounter in regard to cybercrime. The threats identified are the most common tactics used against organizations that resulted in a data breach.

Read More »


Plan, Control, & Reduce Risk With a Technology End-of-Life Strategy

May 19, 2022

Security, compatibility, and compliance are the biggest threats that result from not keeping your technology current, also known as technical debt. These problems can occur by running software and hardware past the point of manufacturer support, putting your business at unnecessary risk.

Read More »

IT Solutions & Support

5 Qualities of a Reliable Cloud Migration Service Partner

May 05, 2022

Have you decided to relocate some or all of your organization's infrastructure to a cloud services provider (CSP) such as Microsoft, Google, or Amazon? If so, the next step is to consider who will serve as your cloud migration service partner. The right consultant can get you to the cloud securely and cost-effectively while enhancing performance. But ... not all cloud migration service partners are created equal.

Read More »

Business Transformation, IT Solutions & Support