Protecting Your Business Mac Computer from Cyber Infections: Tips to Know

Tips to Protect Your Mac Computer from Cyber Threats Mac computers have an excellent reputation when it comes to cybersecurity, but they can still be targeted. Find out about protecting your Mac from threats. Malware, ransomware, phishing—the cyber threats on the internet abound, and these threats are generating an astounding cost to the people who […]

A Chilling Look Inside a Russian Ransomware Cell

The Real Ransomware Story How do ransomware pirates get into your systems, and how can you stop them? SonicWall took a look behind the scenes at a real Russian ransomware cell. Here are a few takeaways: Watch out for Ports 5900 and 5901 Passwords matter … hackers look for passwords from the “crazy and the […]

What Are Your Company’s Responsibilities Following a Data Breach?

Learn from Marriott’s Example: Notification Responsibilities After a Data Breach Most states, the District of Columbia, the Virgin Islands and Puerto Rico have passed legislation regarding notification of security breaches. Know the laws in your state.   To answer this question, let’s start with the example experienced by Marriot International recently when a breach exposed the […]

Achieving Success with Information Technology

Why Organizations Need to View IT as Central to Success and Profit Think Your IT Department is Simply There to Make Repairs and Solve Minor Problems? Find Out Why It Should Be the Center of Your Organization’s Long-Term Strategy   Information technology (IT) is more than a critical function. A well-run IT department should be […]