How To Prepare For Cyberwar: It Starts With Identity

Cyberattacks are rapidly evolving in sophistication and scale. The line between the digital and the physical realm has become more blurred. Foreign cyberattackers have used destructive malware to erase data from hard ...
pandemic

Fusion Creates Online Pandemic Readiness Resource

Fusion Risk Management Inc., a provider of disaster recovery software and services, this week announced it will make available an online pandemic readiness toolkit. Company CTO Corey Cowgill said the goal is ...
Security Boulevard

How to Protect Your Business from Ransomware

After a series of ransomware attacks hit cities last year, finally some good news: Las Vegas was able to stop a ransomware cyber-attack in its tracks. When the cyber-attack was detected, the ...
Figure 1: Warning from ADPREP /FORESTPREP that the schema upgrade is irreversible

Upgrading to WS2016/2019? Consider a Safety Net for AD

A colleague here at Semperis recently looped me into a conversation with the manager of a large Active Directory environment running on Windows Server 2008 R2. With end of support for Windows ...
Semperis DEMO: Recovering Active Directory cleanly: without re-introducing malware

Cyber Scenarios Expose Shortcomings of BMR

Ransomware and wiper attacks are causing organizations to re-evaluate their backup and recovery capabilities. An obvious concern is whether backups are safe – for example, are they offline where they can’t be ...

Revisiting The Concepts of Disaster Recovery and Risk as Organizations Move Their Infrastructure To The Cloud

The calculus for disaster recovery and risk management is changing. Most small businesses within the past decade would often keep many of their critical technology assets locally, perhaps in a server closet, ...

Pretending about Cybersecurity Risks

I have written a couple of columns comparing cybersecurity risk management to managing climate change—one with the title “Cybersecurity Climate Change” (December 10, 2018), and the other “The Cybersecurity Paradox” (June 19, ...

NSA sounds the alarm on BlueKeep: Windows vulnerability opens the door for the next WannaCry

It’s been just over two years since WannaCry, the ransomware that exploited the EternalBlue vulnerability to infect hundreds of thousands of computers around the world and inflict an estimated $8B in damages ...
small business

Most IT Shops Have Latent Cyberthreats in Their Backups

Traditional solutions aren’t stopping cyberthreats from compromising critical network systems It’s alarming but true: Your organization is under assault. Cybercriminals have their sights set on your IT systems, and no matter what ...
Security Boulevard

Your Active Directory was compromised, is it all lost? – Part 2

Hi, This is part two of a blog that I had written earlier. The premise of part one was to better understand what are the options that companies face should their Active ...