Call Us: 1-866-802-9405

By

Matthew Hreben
Companies targeted by cyber-criminals Whether your company is a big or small enterprise, there is a good chance that it could be a target for hackers and cyber-criminals. An important operating item many enterprise companies do not budget into their annual costs, and most notably spend time on is cyber security. This is usually due...
Read More
Time is Ticking to Achieve NIST 800-171 Compliance   Your team is invited to attend our upcoming event discussing the 7 Key Steps to Help You Achieve NIST 800-171 Compliance. This presentation provides insights and details on how to effectively meet the compliance requirements before the fast-approaching Dec. 31, 2017 deadline. Attendees will gain an...
Read More
Security Vitals Shares Expertise in Mitigating Security Weakness Pontiac, MI – One of the largest threats and persistent risks to small and medium-sized businesses is the potential for a security breach. Hacks, scams, and phishing requests come in every size and shape, and are exponentially getting worse as nefarious individuals, organizations, and companies, both locally...
Read More
Security and Cloud Storage Recent news stories about cloud computing solutions have highlighted its role data leaks. Organizations that have suffered from leaks range from the Republican National Committee to Verizon, and more recently Dow Jones Publications (the parent company of The Wall Street Journal). Events like these cause some to question the security of...
Read More
Malware and Malicious Hackers are critical threats that require different, but often complimentary, means of defense. To effectively defend against these two types of attacks one must first understand what they are and why they exist.  It will become clear that despite the relative simplicity of defending against malicious hackers, they pose the most current...
Read More
Business objectives provide the foundational element for planning, managing, and growing an organization.  When we think about business objectives it’s very easy to focus on the obvious elements like supply chain. For organizations that make cars, designers start the process, which is followed by a complex blend of resources including parts suppliers, assembly line workers,...
Read More
A 2016 report by Symantec, a large security and anti-virus company, sheds light on the current environment of ransomware attacks.   One of the more interesting discoveries is that the Services sector is the most targeted area at 38 percent, followed by Manufacturing, Finance, Insurance and Real Estate.  The services sector appears to be easiest to...
Read More
Use Secure Connections/VPN When offered a choice between connecting to an unsecured network vs. a secured network, always choose the latter.  The ease of connecting to an unsecured network is enticing at times, but logging in with credentials always pays off.  If no secured network is available, use a Virtual Private Network, or VPN, to...
Read More
County System Hacked Just last week, county officials in Bingham County, Idaho, reported a large scale attack on their system.  County employees discovered inaccessible encrypted files on their servers, followed by a prompt demanding a ransom in exchange for Bingham County’s data. Ransomware attacks of this size were frequently reported in 2016, but stipulated payment...
Read More
The amount of data in the world is doubling every year, predicted to surpass 44 zettabytes, abbreviated ZB, up from 4.4 ZB in 2014. For reference, 1 ZB is equivalent of 1 trillion GB.  With this massive amount of data comes an increased difficulty to secure, store, and make sense all of it. More specifically,...
Read More
1 2 3 4