5 Best Practices for Surviving Ransomware

Every 11 seconds, a ransomware attack occurs. Organizations now face the daunting reality that no longer is the question “if” a ransomware attack will happen; now, it is only a matter of “when” they will get hit. Is there anything you can do when you know the enemy is at ... Read More

Passwords: A Fickle Yet Necessary Means to Security

Passwords. You can’t live with them and you can’t live without them. The advent of the web has created a veritable spider web for every individual. What was often a matter of remembering one or two passwords for your computer and your email account has now mushroomed to having to ... Read More

Zero Trust for Data

Encryption has been around for a long time. It is the holy grail in data security because data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Zero trust is a ... Read More