Posts

GDPR and Business Continuity―why you must care
New Jersey is considering enacting GDPR-like regulations and other states are sure to follow. Find out what you need to do now to get in front of this pending regulation.

A Lesson To Be Learned
Here are a few headlines from some security blogs I monitor…

Anatomy Of A CEO-Wire Fraud Attack
CEO-Wire Fraud is a dangerous Social Engineering attack that…

How To Identify A Phishing Email—An Example
One of our good clients sent us a phishing email supposedly from…

Hackers Step Up Phishing Attacks
It seems that phishing attacks have increased exponentially…

How To Protect Your Company From Data Loss
Data loss can happen at anytime—suddenly and without warning.…

A Disaster Averted—Our Battle With Cryptolocker
Introduction
Recently, we received a call from a client reporting…

How To save Your Business from Ransomware
Introduction
Ransomware is alive and well in cyberspace. In…

Identifying Critical Processes Is Key To Recovery
Introduction
One of the most overlooked steps in Business Continuity…

The Real Cost Of Network Downtime
Is this scenario familiar?
It’s a very busy time of the year.…