Only twice has Microsoft issued a patch for old, out-of-support versions of Windows: in 2017, just before the massive WannaCry cyber attack, and just recently. With newly discovered vulnerabilities from Intel, and even one in Windows 10, a very high number of computers around the world are potentially exposed right now. While we haven’t seen exploits yet to take advantage of these vulnerabilities, they likely aren’t far off. Conditions have scarcely been better for a massive cyber attack on the scale of WannaCry. Last week, I had the chance to break this down for listeners of the Brad Davis Show.
Cloud computing has been around for a while now, but it remains a bit mysterious to many in the business world. I was thrilled to have the chance to help well-known tech journalist John Edwards break down some common misconceptions and assumptions in an article for CIO.com.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
From tornadoes and floods to security breaches and employee error, unexpected catastrophes can befall any type of business. While you may not be able to prevent or even anticipate disaster, you can be well-prepared before it strikes in order to minimize the impact and downtime. The importance of testing your plans for disaster recovery and business continuity can’t be understated.
According to a recent study, 48 percent of small businesses lack a business continuity plan—even though they are most at risk of going under when disaster strikes. While unexpected crises can happen at any moment, their impact can be minimized and mitigated through careful planning.
Every year Cisco releases an annual Cybersecurity Report detailing the state of global cybersecurity. In the most recent edition, two key trends stood out to me as threats that every business owner and IT manager should be aware of and prepared for.
It’s nearly 2019, and what it takes for CIOs and other technology executives to be successful looks a lot different than it did as recently as say, 2014. Recently, I was quoted by two major technology news outlets about the role of technology executives in the success of their organizations:
From Hurricane Irene in 2011 to the “blizzard of 2013” that dumped two feet of snow across much of the state, Connecticut has seen its fair share of extreme weather. Not only do these natural disasters disrupt people’s daily lives and prevent them from coming into work, they also disable or damage critical business infrastructure and utilities such as power, electricity, and heating.
Not too long ago, I was interviewed for a Comcast Business blog post and Inc.com article about Wi-Fi security. As long as the Wi-Fi is up and running, the security of it isn’t something the average person gives a lot of thought to, but improperly secured Wi-Fi networks present a number of unique vulnerabilities hackers can exploit to gain access to sensitive data. To understand Wi-Fi security, it helps to know about these strategies that hackers use.