by Katherine Parker | Feb 14, 2020 | Data Security, Email Environment Security, General Information, Hacker Prevention, Incident Response Plan, Intrusion Prevention, Malware, Malware Incident Response, MSSP, Network Security, Network Visibility, Secure Data Storage, Uncategorized
For many companies, the need for a tightly secure business network is high, but the budget for making a secure network happen is low. Often times business owners and upper management have to make hard decisions about who they hire to manage these decisions. Seasoned...
by Katherine Parker | Jan 30, 2020 | Cyberattack, Data Breach Response, Incident Response Plan, MSSP, Network Remediation, Network Security, Uncategorized
In this IT News Brief: Are you ready? A Cyberattack or databreach is very likely to hit your business. Will it hit you hard, or have you prepared for it? The path of preparation is daunting, but there are things to make it easier. We discuss. Meet Miguel Espinosa, one...
by Katherine Parker | Jan 8, 2020 | Cyberattack, Data Security, Device Security, Email Environment Security, Hacker Prevention, Incident Response Plan, Intrusion Prevention, Network Security, Secure Data Storage, Uncategorized
Texas governor Greg Abbott provided a formal address yesterday (January 7, 2020) regarding the state of affairs with Texas cybersecurity. Our own Texas DIR has been monitoring cyber activity across Texas, and has found up to 10,000 attempted attacks per minute from...
by Katherine Parker | Apr 25, 2019 | Data Breach Response, Incident Response Plan, Malware Incident Response, Network Remediation, Network Security, Runbook
FollowFollowFollowFollow Print Article You might have heard about the ransomware attack on Arizona Beverage Company a few weeks ago. Since the attack, the company has needed several weeks of network remediation to recover. They have thrown hundreds of thousands of...
by Katherine Parker | Apr 5, 2019 | Data Security, Email Environment Security, Incident Response Plan, Network Security, Network Visibility, Penetration Test, Runbook
This is Part 2 of Network Security Across the Full CyberAttack Continuum: Defenses To Have Before The Attack Happens. Part 1 covers some new Malware Innovations, the importance of Trained Staff to help network users identify and deflect malicious activity, and the...