Party Foul: Ransomware Groups Target Everyone - Featured Image

Party Foul: Ransomware Groups Target Everyone

The last three weeks have been high profile for ransomware attacks in the US. The outdoor navigation company Garmin was hit in late July with a huge ransomware attack and paid multiple millions of dollars to a hacker group in Russia known as Evil Corp. While most of us know Garmin for fitness apps, the real impact here was that pilots were unable to update or download new maps from Garmin’s flight navigation server which is a MAJOR safety issue! Just last week, the Maze hacker group locked the camera manufacturer and multimedia company Canon offline. According to Maze, stole 4 TB of sensitive data. To date Maze has only proven marketing content. With as fast as Canon came back online, most practitioners surmise that they paid the ransom. This week the Sodinokibi group who run the REvil malware set announced that they stole over a terabyte of data (including substantial intellectual property and client data) from Brown-Forman, the US liquor conglomerate that owns brands like Jack Daniels, Finlandia, and Sonoma-Cutter wines among others. Brown-Forman confirmed that the data had been ex-filtrated but are not currently pursuing paying the ransom. It appears that neither Evil Corp nor Maze are specifically targeting intellectual property but are using intellectual property and or blocked access to leverage high ransoms.
The CIO (R)evolution - Featured Image

The CIO (R)evolution

There’s been a rapid upheaval in corporate America, with some job titles disappearing entirely and new ones rising to the top of organizational charts. In my opinion, the job description of a Chief Information Officer has potentially changed the most. In fact, a number of people argue that the position is obsolete, particularly with the advent of BYOD and personal applications, platforms like Salesforce.com and the use of offsite servers.
Blockchain Panel Discussion - Video - Featured Image

Blockchain Panel Discussion - Video

Everyone's talking about blockchain’s untapped potential. Its touted benefits may include lower cost, risk, and capital requirements, faster transactions, more transparency and reliability, improved privacy, and unparalleled security, to name a few.
The Rise of CASBs - Featured Image

The Rise of CASBs

Late last year, industry analyst group Gartner issued a report on the market for Cloud Access Security Brokers (CASB), a software service that’s not yet widely understood. The report included a startling statistic: by 2020, Gartner predicts that 60 percent of large enterprises will use a CASB to govern cloud services. Today, we’re at just over 10 percent usage.
How Artificial Intelligence Can Help Detect Cyberthreats - Featured Image

How Artificial Intelligence Can Help Detect Cyberthreats

Over the past few years it’s become clear that the fortress mentality of securing the perimeter and hardening the system is not effective in today’s cyberthreat environment. Even if you add in patching all your software, and randomize passwords, bad actors are going to get past your heavily guarded gate and into your network.
Data Security Challenges for Healthcare Providers - Featured Image

Data Security Challenges for Healthcare Providers

Cybercriminals have their sites on healthcare data. See tips for how to protect this sensitive information. It’s an understatement to say that data security is critical in healthcare, where a breach can not only impact an organization’s effectiveness and reputation but also affect patient privacy and—worst-case scenario—health and safety.
StrataCore Announces New Partnership With Cyxtera - Featured Image

StrataCore Announces New Partnership With Cyxtera

The New Relationship with Cyxtera Speaks to StrataCore’s Commitment to Build a World-Class Partner Portfolio to Enable Enterprise Services to End-Users Across the Globe.
Cybersecurity Challenges Companies Face in an IoT World - Featured Image

Cybersecurity Challenges Companies Face in an IoT World

Protect your company's assets in a world that's increasingly dominated by mobile technology and IoT According to Computer World, there will be more than 25 billion connected online devices by 2020. IBM states that roughly 785 Cloud apps are in use for the average Enterprise while only 60 of those are actually used on a consistent basis. What does this all mean?
3 Tips for Successful Cloud Management - Featured Image

3 Tips for Successful Cloud Management

Businesses of all sizes can benefit from having a fully integrated, reliable, secure, and cost-effective hybrid cloud deployment. If you have been tasked with the challenging responsibility of revamping an existing cloud computing strategy or implementing one for a growing business, there are some important best practices to keep in mind.
Guidelines for Cybersecurity Breach Prevention - Featured Image

Guidelines for Cybersecurity Breach Prevention

Don’t be tomorrow’s next big data breach headline
7 Reasons to Hire a Virtual CISO - Featured Image

7 Reasons to Hire a Virtual CISO

Is your data safe from motivated cyber criminals? CIO Magazine boldly stated that companies that can't or won't pay big money for top-level security talent run the risk of joining the ranks of Target, Home Depot, and many other big brands that have suffered from damaging security breaches.
How 3 Companies Saved Thousands Renegotiating IT Contracts - Featured Image

How 3 Companies Saved Thousands Renegotiating IT Contracts

Cost Savings Use Cases  In today's marketplace, businesses need to be adaptable, scalable, and very conscious of operational expenses, including IT budgets.