Technical Support: 412-349-6678 | Incident Response

Blog & Latest News

Creating a Secure Network - Ideal Integrations

Cybersecurity Awareness: Creating a Secure Network

It is Cybersecurity Awareness Month! For that reason, we want to help you create a more secure network with defense-in-depth techniques.  Defense-in-depth is an acknowledgement that firewalls, while critical and very effective, cannot stop all attacks.Instead, we need to create layers of defense that slow down and limit the impact of an...
Professor teaching at a college - Hackers and Schools

Why Hackers Go After Educational Institutions

Last week, we showed that ransomware attacks were on the rise and discussed how municipalities need to be aware that they are a prime target. Kelly Sheridan of DarkReading shed additional light on the subject.  Sheridan cites a study by the cloud-security firm, Armor, which has tracked nearly 200 publicly disclosed ransomware...
Ransomware Attacks on Government Organizations

Ransomware Attacks on Government Organizations

In March 2018, a SamSam virus attack crippled the city of Atlanta, and the perpetrators demanded a $51,000 ransom. This high-profile attack caused the closure of the Hartsfield-Jackson Atlanta International Airport, and took down at least one-third of the 424 software programs used by the City of Atlanta.  The city refused...
Disaster recovery for businesses

How to Create a Disaster Recovery Plan – Pt. 2

Hurricane Dorian ravaged the Bahamas and then the Atlantic provinces of Canada.  On the 1,000-mile trip up the Atlantic coast, it might have swung and hit any of those neighboring states head-on and caused enormous damage.  Instead, it spared most of the US. Let’s use this near-miss as an opportunity...