Provide clear instructions on what to do if your employees encounter a potential #ransomware lure. Learn how here. https://datto-content.amp.vg/web/bs9jye1098pb5
Risks
The measure of quality
Done right is done once but half-done lasts forever. I coined this phrase a couple of years ago to capture how so often we solve immediate problems in half-measures and then move on to other things. The result is that we end up tripping over a less than adequate...
Business Guide to Ransomware – Landing Page
Protect your business against #ransomware by educating your staff. Find out here. #stopransomware https://datto-content.amp.vg/web/dbkp1fcd6vnxi
Building Trust
There is an Indian proverb: "Trust grows at the rate of the coconut tree and falls with the speed of the coconut." When meeting for the first time with prospective customers, I always start out by asking them about their business. What's the key things that help them...
Latest in Phone Scams
As a pretty security savvy IT person, "Yours Truly" was almost stung this morning. I answered an incoming cell call from an Ontario phone number. Very quickly, a recorded message began with a North American digitized voice in perfect English telling me that I had 2...
Ransom Attack Hits DC Police Department
Yesterday, May 13, 2021, the Washington DC's Metropolitan Police Department (MPD) reported a massive internal data breach. It was the worst ever ransomware attack on a US police department. Thousands of documents were posted to the dark web on Thursday. Included in...
May the Force Be With You
Star Wars fans recognize this greeting and celebrate it every May 4th. A post-incident assessment of Rogue One's breach of the Galactic Empire's datastore on the planet Scarif was recently conducted. It found a number of critical cyber weaknesses in Imperial Security....
Do Our Patching Cycles Need to Change?
Best practice has been to patch systems--both operating systems and applications--every 28-30 days (a month). Some don't even do it this often (as shown by the recent Microsoft Exchange hack). This cycle is based on the practice that Microsoft and other vendors...
When the Gaming Gets Real
Being a business services company, Atlas doesn't serve a lot of gamers. But sometimes a working parent wants to protect all the computers in their home, not just theirs. Sometimes those computers belong to gamers. And some gamers want to load software that gets around...
Is Your Cloud Data at Risk?
There is a widespread misconception that data created and stored in Google Workspace does not need to be backed up. While Google certainly has you covered when it comes to any outages on their part, recovering data due to accidental or malicious deletion is your...
Computer Manufacturer ACER Hit with $50 M Ransom
Acer, one of the world's largest computer manufacturers, was hit with a $50 million dollar ransomware attack. It is the largest ransomware demand currently known. Rumours have surfaced that attackers gained access to Acer's systems through the Microsoft Exchange...
The Microsoft Exchange Hack Explained…
In January, a state-sponsored hacking group from China known as "Hafnium" discovered 4 "zero-day exploits" in Microsoft's Email Server software called "Microsoft Exchange." You may have heard about this in the news, and you are probably asking whether you should be...