Forming a Backup Strategy: 4 Steps to Follow

A comprehensive backup strategy is an essential part of an organization’s cyber safety net and it’s important to have one outlined & put in place before a data loss event occurs. Follow these four steps to help you form a strategy that … Continue reading Forming a Backup Strategy: 4 Steps to Follow

Stegware aka Steganography Malware – Malware of the Month, July 2019

Stegware, or Steganography Malware, is accomplished by concealing a file, message, image, or video within another of the same type for malicious purposes. Stegware’s relatively easy implementation and difficulty to detect have put it on the rise lately… Continue reading Stegware aka Steganography Malware – Malware of the Month, July 2019

SQL Injection Attacks (SQLi) — Web-based Application Security, Part 4

SQL Injection attacks are accomplished via insertion of untrusted input in a valid command or query of a vulnerable SQL-driven website or database, which then maliciously alters the execution of that program. SQL Injection attacks are simple to execute… Continue reading SQL Injection Attacks (SQLi) — Web-based Application Security, Part 4

6-Point Office 365 Post-Migration Checklist

Plan for your post-migration with the same enthusiasm as your Office 365 migration planning. Significantly offset the post-migration chaos by adhering to this six-point post-migration checklist.
The post 6-Point Office 365 Post-Migration Checklist appe… Continue reading 6-Point Office 365 Post-Migration Checklist

Top 3 Enterprise SaaS Data Protection Trends

Cloud computing has come of age, both in terms of adoption and evolution. In order to get more insight into cloud security and data protection trends, ESG surveyed 370 IT professionals responsible for data protection for their organization. Here are th… Continue reading Top 3 Enterprise SaaS Data Protection Trends

5 Guidelines for a Successful Office 365 Migration

When moving to the cloud, security and compliance are among the top concerns for many organizations. Following these 5 guidelines will help to ensure a smooth transition to Office 365 and establish a means for successful operation from the get-go.
The … Continue reading 5 Guidelines for a Successful Office 365 Migration

Invisible aka Fileless Malware — Malware of the Month, June 2019

Invisible malware is a type of Fileless malware that comes with zero footprint and is responsible for an increasing number of endpoint or zero-day attacks. It typically resides in memory, comes packaged as firmware or lives in your Basic Input/Output S… Continue reading Invisible aka Fileless Malware — Malware of the Month, June 2019

Hurricane Season is Upon Us: Is Your Business Continuity and Disaster Recovery Plan Ready?

As the southeastern United States braces for another hurricane season on the heels of the busy 2018 season, it’s a good reminder for all organizations, no matter where they are headquartered, to review their business continuity and disaster recovery pl… Continue reading Hurricane Season is Upon Us: Is Your Business Continuity and Disaster Recovery Plan Ready?