Technical Support: 412-349-6678 | Incident Response

Category: Our Blog

Creating a Secure Network - Ideal Integrations

Cybersecurity Awareness: Creating a Secure Network

It is Cybersecurity Awareness Month! For that reason, we want to help you create a more secure network with defense-in-depth techniques.  Defense-in-depth is an acknowledgement that firewalls, while critical and very effective, cannot stop all attacks.Instead, we need to create layers of defense that slow down and limit the impact of an...
Cellphone with Security Warning - Ransomware

Ransomware: Preparing for an Attack

Last week we talked about how the vulnerability is the target, and that remains true. Of course, once someone has hacked your system and has found a way in, it might become a different story.  For example, most ransomware is randomly targeted, and nets between $17,000 and $500,000 per attack, with...
Cybersecurity - 7 tips for how to improve

The Vulnerability is the Target

Data Breaches and CybersecuritySometimes clients know why they might be targets. Banks, for example, have been targets long before they went digital.  However, many small companies wonder why would they be a target for hackers. In an interview with Sue Marquette Poremba of IT Business Edge, James Strickland, CEO of Veridium, gives...
Virtual Infrastructure - Ideal Integrations

Why You Should Use A Virtual Infrastructure

Are you trying to decide whether or not virtualization is for you?If you want to saving money, energy and space, then you're certainly on track.Regardless of your business's size, a virtual infrastructure adds dimensions of both ease and stability.  It's software-based IT, so one physical server actually hosts multiple virtual...