Businesses Must Understand The Intricacies of Cloud Security

Businesses Must Understand The Intricacies of Cloud Security

Businesses Must Understand The Intricacies of Cloud Security It does not matter the size of the organization or the complexity of the operations businesses have been sold on the idea that “the cloud” is the answer.  For MGM Resorts they found out that the data they...
IT Disaster Recovery/Business Continuity Exacerbated by Coronavirus

IT Disaster Recovery/Business Continuity Exacerbated by Coronavirus

IT Disaster Recovery/Business Continuity Exacerbated by Coronavirus Whenever there is a big story in the News you will find Cybercriminals willing and eager to exploit people using keywords and topics from news stories.  With all the stories about the Coronavirus that...
Ransomware rings adapt to business declarations by Revealing Stolen Data

Ransomware rings adapt to business declarations by Revealing Stolen Data

Ransomware rings adapt to business declarations by Revealing Stolen Data Did you know that backups may no longer help you recover from Ransomware? Ransomware is rapidly infecting businesses across the world.  Even the most prepared organization have found themselves...
Extensive US Intellectual Property theft by Chinese being investigated by FBI

Extensive US Intellectual Property theft by Chinese being investigated by FBI

Extensive US Intellectual Property theft by Chinese being investigated by FBI Intellectual theft is a huge problem in the US and the largest perpetrator is the Chinese government.   They target military sub-contractors and sub-sub-contractors, universities,...
Employee Training Key to Spotting Existing and Emerging Threats

Employee Training Key to Spotting Existing and Emerging Threats

Employee Training Key to Spotting Existing and Emerging Threats We have entered a new phase of sophisticated frauds that can devestate organizations.  Knows as Deep fake fraud, hackers use machine learning and other artificial intelligence tools to manipulate voice,...