Top Menu

How Ransomware Finds a Foothold

If your laptop and its contents were suddenly held for ransom tomorrow, how much would you be willing… [more]

How Ransomware Finds a Foothold How Ransomware Finds a Foothold

Three Components of a Successful Security Plan You Shouldn’t Count Out

Do you have your security priorities all wrong? A 2014 study by Dell reports that over 75% of respondent… [more]

Three Components of a Successful Security Plan You Shouldn’t Count Out Three Components of a Successful Security Plan You Shouldn't Count Out

If Your Business Depends on Data, You Need a Security Operations Center

Only the gullible and foolhardy wait for cyberthreats to appear on their doorstep before taking any action.… [more]

If Your Business Depends on Data, You Need a Security Operations Center If Your Business Depends on Data, You Need a Security Operations Center

Your Money or your Data: Ransomware Resurgent

The world's most prolific hostage takers don't carry bombs or guns. Using only keyboards, the Internet… [more]

Your Money or your Data: Ransomware Resurgent Your Money or your Data: Ransomware Resurgent

How Hotels are Getting into the Cloud

For the hotel industry, change has been long in coming… but it's coming nevertheless. Many hospitality… [more]

How Hotels are Getting into the Cloud How Hotels are Getting into the Cloud

Recent Articles

How Ransomware Finds a Foothold

How Ransomware Finds a Foothold

If your laptop and its contents were suddenly held for ransom tomorrow, how much would you be willing to pay for it? Hackers can easily put you in a position where you'll need to pay[...]
Three Components of a Successful Security Plan You Shouldn't Count Out

Three Components of a Successful Security Plan You Shouldn't Count Out

Do you have your security priorities all wrong? A 2014 study by Dell reports that over 75% of respondent organizations admitted to security breaches over the past year, but less than 20% prioritized the prediction[...]
If Your Business Depends on Data, You Need a Security Operations Center

If Your Business Depends on Data, You Need a Security Operations Center

Only the gullible and foolhardy wait for cyberthreats to appear on their doorstep before taking any action. The smart money is on the proactive approach: investing in threat monitoring and timely detection to stop a[...]
Your Money or your Data: Ransomware Resurgent

Your Money or your Data: Ransomware Resurgent

The world's most prolific hostage takers don't carry bombs or guns. Using only keyboards, the Internet and skillful social engineering, they can do far more economic damage than their more conventionally-armed counterparts. There's little that most[...]
How Hotels are Getting into the Cloud

How Hotels are Getting into the Cloud

For the hotel industry, change has been long in coming… but it's coming nevertheless. Many hospitality operators may still use on-site software and servers, but the cloud is – slowly but surely – winning the[...]