ransomware

Combatting Cybercrime Webinar

(Webinar Recap) Combatting Cybercrime: Strategies and Solutions from the Michigan State Police

We were fortunate enough to have a special guest from the Michigan State Police Cyber Division join us, for our latest webinar and they provided some incredibly valuable insights on the topic of cybersecurity.

In case you missed it, we have made the video recording of the webinar available for your viewing pleasure. We understand that cybersecurity can be a complex and daunting subject, but we believe that the information shared during the webinar will help you better understand the importance of staying safe online.

(Webinar Recap) Combatting Cybercrime: Strategies and Solutions from the Michigan State Police Read More »

GRIT talks the talk and GRIT walks the walk

Take it From Chuck – Get the Best Team Possible in Your Corner

“It is not an expense to get the best IT company that you can find. It’s an asset!”

Chuck Bowers from Rocket Enterprise Inc, has built a high-performing, high-integrity business that has been around since 1982. When an unfortunate ransomware attack brought the business to a standstill, Chuck looked to seek a new partner to manage his company’s IT and network security.

Take it From Chuck – Get the Best Team Possible in Your Corner Read More »

GRIT Technologies and Datto CISO Discuss Cyber Resiliency video image clip

GRIT Technologies and Datto CISO Discuss Cyber Resiliency

What You Should Know About Cyber Resiliency In this past few years there has been a shift across the IT industry from Cybersecurity, over to Cyber Resiliency. The idea is to have the people, processes and procedures in place ahead of time, so you can quickly respond to a breach, when it happens. Past practices

GRIT Technologies and Datto CISO Discuss Cyber Resiliency Read More »

Matt Lang Matt Lang Why You Should Restrict Admin Rights video image clip

Cybersecurity Awareness Month: Why You Should Follow The 3-2-1 Backup Rule

https://www.youtube.com/watch?v=hODqv3smyT8 Backing up your data regularly is an overlooked step in personal online security. The top IT and security managers follow a simple rule called the 3-2-1 backup rule. Essentially, you will keep three copies of your data on two diverse types of media (local and external hard drive) and one copy in an off-site location (cloud storage).  If

Cybersecurity Awareness Month: Why You Should Follow The 3-2-1 Backup Rule Read More »