Ransomware doesn’t always strike one place at a time. A recent ransomware attack shows it can strike multiple places simultaneously by targeting managed service providers (MSPs). These are organizations that small to medium businesses outsource IT needs to. This creates … Read More
Data Security


Lessons From a 161 Million Record Database Data Breach
Each day, people share their information with websites in order to receive services. Unfortunately, those services can be insecure. According to scmagazine, a recent database data breach on a MoviePass subdomain exposed 161 million records. This could have potentially exposed … Read More

What is network segmentation?
Putting all your organization’s devices onto one public network and allowing VPN access to cloud-based resources without internal security is an ideal situation for hackers looking to steal data. But when internet connecting devices are everywhere from your phones to … Read More

What is the Zero Trust Model
Zero Trust is a model for IT security in which access is only granted if the connecting devices and users are confirmed to be both authorized and authenticated. This is true regardless of the location of devices or their users. … Read More