Posts

GDPR and Business Continuity―why you must care

New Jersey is considering enacting GDPR-like regulations and other states are sure to follow. Find out what you need to do now to get in front of this pending regulation.

A Lesson To Be Learned

Here are a few headlines from some security blogs I monitor…

Anatomy Of A CEO-Wire Fraud Attack

CEO-Wire Fraud is a dangerous Social Engineering attack that…

How To Identify A Phishing Email—An Example

One of our good clients sent us a phishing email supposedly from…

Hackers Step Up Phishing Attacks

  It seems that phishing attacks have increased exponentially…

How To Protect Your Company From Data Loss

Data loss can happen at anytime—suddenly and without warning.…

A Disaster Averted—Our Battle With Cryptolocker

Introduction Recently, we received a call from a client reporting…

How To save Your Business from Ransomware

Introduction Ransomware is alive and well in cyberspace. In…

Identifying Critical Processes Is Key To Recovery

Introduction One of the most overlooked steps in Business Continuity…

The Real Cost Of Network Downtime

Is this scenario familiar? It’s a very busy time of the year.…