Tag: data protection

Ransomware may have possibly taken the crown as THE crime to beat in 2016, with record growth and profits for criminals. The healthcare industry is a particularly attractive target, because hospital systems are often vulnerable and the critical nature of patient data means they are more likely to pay out than risk being locked out of their files. While payments used to start around $50, the average payout is now $679, with $209 million paid out in Q1 of 2016 …

More and more industries, from higher ed to transportation, are adopting the cloud and the endless number of possibilities it provides. This has led to the development of the next-generation cloud, known as X as a Service. XaaS, where X stands for anything, is a single service or collection of services that are delivered to the client over the internet. The most common examples are software (SaaS), infrastructure (IaaS), and platform (PaaS), but virtually every layer of the IT stack …

Ransomware was officially a billion dollar crime in 2016, with more than 4,000 attacks since Jan. 1 and at least 25 variants of ransomware discovered. Researchers have predicted they would discover more than 100 variants before year’s end. And as of August, Malwarebytes research uncovered 40 percent of businesses in four countries experiencing an attack in the past year. One third of those businesses attacked lost revenue as a result. Who are the victims? Healthcare and financial services are the most popular enterprise targets, …

As technology gets more complex and ingrained into our lives, studies have shown consumers are increasingly feeling overwhelmed about how to protect themselves. Since criminals are getting more sophisticated, we have to as well, right? Not so. The reason we feel overwhelmed isn’t always because of the levels we have to go to in order to protect ourselves, it’s because we have more devices we need to protect. Most consumers trust that the IoT products they buy are being built with security …

Many major internet sites were slow or entirely downed on Friday thanks to at least two Distributed Denial of Service attacks, according to Engadget. The first attack came Friday morning at 7:10 a.m. and affected Dyn, one of the major domain name systems of the internet. Affected sites included Twitter, Spotify, Reddit and The New York Times. Dyn claimed to have everything back up and running, but another attack hit at about 12 p.m., causing Twitter to shut down entirely …

Encryption is becoming more and more a part of our personal and professional lives. One could even argue that we can’t live without it. In fact, it’s become so standardized that Amazon recently announced it was bringing back encryption to its Kindle Fire tablet after removing it in a previous version and hearing customer complaints. And with all the media coverage surrounding Apple’s latest encryption fight, it’s safe to say it’s at the forefront of security-related minds. Encryption, which typically uses an …

Encryption has been widely talked about as one of the best tools to protect you against potential attacks on your data. For many companies processing credit card payments, encrypting data is required for compliance with standards such as PCI DSS and individual state laws. But if you’re in the healthcare industry, it’s even more important because it’s not required for hipaa compliance. What is encryption? It takes your data and codes it using a series of mathematical formulas to render …

In today’s faster-than-ever-paced world, it’s becoming more and more important for businesses to have all the technology they need at their fingertips in order to survive. In the event of a disaster especially, if organizations want to offset their losses, they need to be able to access and recover their data and infrastructure as quickly as possible. Continuous data protection can help with this. True continuous data protection (CDP) is real time replication of data as it is being written …

We all know the importance of disaster recovery as it relates to business continuity and HIPAA compliance. However, there is a lot more to disaster recovery, and not all recovery options are created equal. Different kinds of disaster recovery are dependent on the needs of your business. In this post, we’ll talk about how the speed at which you need to recover your data and infrastructure affects your recovery site options and cost. When it comes to the speed of recovering …

Picture this: Your business requires the medical and payment data of three million people, one-third of whom are Medicare recipients. Because of this, you have a big red bullseye painted on your infrastructure and all sorts of seedy characters want access to that information, either for themselves or to sell in the dark underbelly of the internet. “Don’t worry,” you say, “we’re protecting that data.” You have a security infrastructure in place, so you figure everything is fine. But how …

Get started now. Exceptional service awaits.

Live Chat