RaaS, ‘Ransomware As a Service’ | Cybercrime Rising
Just a few years ago you may not have even heard the term ransomware. Today the word is littered throughout just about every IT message, preaching the importance of cybersecurity. It’s true. Cybercrime is certainly on the rise, and more and more criminals are joining the party. According to Sophos Research, over 50% of organizations were struck by ransomware last…
Read article
October is National Cybersecurity Awareness Month
What do you associate with October? Pumpkins, corn mazes, autumn leaves, Michael Myers? What about cybersecurity? Okay, probably not, but did you know that all the way back in 2003, the Dept. of Homeland Security deemed October National Cybersecurity Awareness Month? (NCSAM) The campaign was created to educate both private and public sector on the importance of cybersecurity, provide tools…
Read article
4 Reasons Every Company Needs a Disaster Recovery Plan
With the recent spike in hurricanes, flooding, and wildfires tearing apart communities and causing mass destruction, SITI felt this was a good time to talk about disaster recovery. It’s always important to have a business continuity and prevention plan by backing up servers and having a trusted IT service provider, but you can’t always plan for devastation. It has been…
Read article
Big Bad Breach | 3rd Major Anthem Data Breach in 4 Years
[caption id="attachment_1100" align="aligncenter" width="608"] Photo by Dean Musgrove/Los Angeles Daily News[/caption] The bigger the company, the more responsibility falls on the decision makers to prevent hackers from gaining access to confidential data. In the healthcare industry, large corporations and medical entities like hospitals and insurance companies have immense amounts of confidential data about patients and clients. This makes for a…
Read article
If & When | Are You Prepared for Disaster Recovery?
Your business is constantly balancing a fusion of information, leaning heavily on information technology to keep operations running smoothly. Servers store large amounts of vital data, VOIP systems and email allow for fluid communication. Major payments are made electronically, exchanging and storing encrypted financial information. Computers, laptops, and other wireless devices create, store and move data and information in a constantly…
Read article
“Petya” Cyber Attack in Ukraine Spreads Internationally
Just a matter of weeks following the accidental kill switch of the “WannaCry” Ransomware attack that began in Europe, yet another serious ransomware attack shut down entire networks in the Ukraine. Just like the WannaCry attacks in May, the global hack shut down computers all over Europe, demanding a digital ransom for the owners to regain access to their files.…
Read article
Sophisticated International Cyber Attack Hits 150 Countries
Analysts are calling the global “ransomware” attack one of the biggest online extortion attacks in modern history. It has been reported that at least 100,000 different organizations have been compromised, at an international level. Companies, factories, government agencies are scrambling this morning to ensure that all necessary cyber security is in place. This points out the level at which the…
Read article