Technical Support: 412-349-6678 | Incident Response

Blog & Latest News

Cellphone with Security Warning - Ransomware

Ransomware: Preparing for an Attack

Last week we talked about how the vulnerability is the target, and that remains true.  Of course, once someone has hacked your system and has found a way in, it might become a different story.  For example, most ransomware is randomly targeted, and nets between $17,000 and $500,000 per attack,...
Blue Bastion Cyber Security

Washington Partners with Blue Bastion, Ideal Integrations

In May, a ransomware attack forced city of Washington, PA officials to take down their communication system and pay a $21,250 ransom to regain control of it.The incident prompted computer systems & website coordinator, Lynn Galluze to contact Blue Bastion and Ideal Integrations for a managed IT and cyber security...
Cybersecurity - 7 tips for how to improve

The Vulnerability is the Target

Data Breaches and CybersecuritySometimes clients know why they might be targets. Banks, for example, have been targets long before they went digital.  However, many small companies wonder why would they be a target for hackers. In an interview with Sue Marquette Poremba of IT Business Edge, James Strickland, CEO of Veridium, gives...

How Safe is Your Office 365 Data?

  Are you using Microsoft Office 365 for your business? It's great, right? From cloud-powered Outlook email to user-friendly apps like Word, Excel, PowerPoint, and OneDrive, you've got one great solution. Office 365 offers great security and customer support. However, according to our friends at Veeam, Microsoft focuses on uptime...
Cybercrime - Breaking Down a Data Breach

Breaking Down a Data Breach

Running a business involves a lot of risk & reward. Whether you develop a new product or introduce a new service, you're putting yourself out there... taking a risk. Whichever you choose, it's bound to flop or succeed - risk/reward. However, one aspect of business involves great risk and zero...