


Protecting Your Inbox
These days, companies’ email systems are one of the most vulnerable places from which a cyber attack can come. this post provides some valuable in formation and solutions relating to how to deal with an attack of this type.

Do You Know How to Recognize a Data Hostage Situation?
It can happen without notice, without a warning: the hostage-taking of your company’s data. Most business people hadn’t heard of ransomware until the WannaCry ransomware attack in 2017 crippled over 300,000 computers. That malicious cryptoworm attack targeted...
HIPAA, SOX, GDPR and the Alphabet Soup of Data Compliance
In this age of policy driven user rights, how you safeguard and access your data has changed as much as the equipment and software you use. Data security and data compliance go hand in hand. One without the other is a recipe for creating challenges you really...