ransomware

GRIT Technologies and Datto CISO Discuss Cyber Resiliency video image clip

GRIT Technologies and Datto CISO Discuss Cyber Resiliency

In this past few years there has been a shift across the IT industry from Cybersecurity, over to Cyber Resiliency. The idea is to have the people, processes and procedures in place ahead of time, so you can quickly respond to a breach, when it happens. Past practices have always focused on preventing a breach …

GRIT Technologies and Datto CISO Discuss Cyber Resiliency Read More »

Matt Lang Matt Lang Why You Should Restrict Admin Rights video image clip

Cybersecurity Awareness Month: Why You Should Follow The 3-2-1 Backup Rule

https://www.youtube.com/watch?v=hODqv3smyT8 Backing up your data regularly is an overlooked step in personal online security. The top IT and security managers follow a simple rule called the 3-2-1 backup rule. Essentially, you will keep three copies of your data on two diverse types of media (local and external hard drive) and one copy in an off-site location (cloud storage).  If …

Cybersecurity Awareness Month: Why You Should Follow The 3-2-1 Backup Rule Read More »

Why Training Users on Phishing is important thumbnail

Cybersecurity Awareness Month: Why Training Users On Phishing Is Important

https://www.youtube.com/watch?v=cHGE2tu5bQc Phishing scams are nastier than ever this year. In a phishing scheme attempt, the attacker poses as someone or something the recipient recognizes and attempts to trick the target into divulging credentials, clicking a malicious link, or opening an attachment that infects the user’s system with malware, trojan, or zero-day vulnerability exploit.   This often leads to a ransomware attack. In …

Cybersecurity Awareness Month: Why Training Users On Phishing Is Important Read More »

Matt Lang Why You Should Restrict Admin Rights thumbnail

Cybersecurity Awareness Month: Why You Should Restrict Admin Rights

https://www.youtube.com/watch?v=FRlf7OoCLUM One overlooked issue for many businesses, is having everyone setup as a local administrator.   By making too many people local administrators, you run the risk of people being able to download programs on your network without proper permission or vetting. One download of a malicious app could spell disaster as this could lead to a data breach or …

Cybersecurity Awareness Month: Why You Should Restrict Admin Rights Read More »