Blog

How unified communications supports disaster recovery

From natural disasters to cyberattacks, businesses in Atlanta have seen their fair share of disasters. In fact, earlier this year, Delta Airlines suffered another huge computer outage that grounded at least 300 flights.

Although a disaster recovery plan is indeed essential for surviving these catastrophes, you must be able to communicate throughout the recovery process to increase your chances of success.

How to achieve compliance in the cloud

Cloud computing simplifies collaboration, application deployment, and data storage. But when it comes to data compliance, the cloud introduces a new level of complexity.

Compliance is a broad topic that covers government initiatives such as the Sarbanes-Oxley Act and HIPAA, as well as industry-created standards like PCI-DSS. These frameworks dictate how organizations should manage and protect data.

Be careful of what you sync to your Office 365 account

With the widespread adoption of cloud computing, security experts are concerned about the growing trend of ransomware in the cloud as well as ransomware on-premise. While ransomware typically holds local devices hostage, advanced strains of malware are targeting cloud-based productivity suites like Office 365 to hit more users working with valuable data.

How to tell whether your systems have been hacked

In the early days of cyberattacks, many hackers were eager to brag about their nefarious achievements by defacing websites or running programs that said “You’ve been owned.” These days, attackers are far more subtle and use a variety of exploitation tools that often take weeks to detect.

2017 Cybersecurity Forecast: Targeted Attacks

Cybercriminals will refine their attack methods. This has been the underlying theme throughout our cybersecurity forecast series.

A few years ago, cyberattacks were automated and usually carried out by amateurs or script kiddies looking to hit a wide range of businesses and individuals.

2017 Cybersecurity Forecast: Data Security Compliance

Installing stringent security measures to protect your data doesn’t just benefit your business financially, it also mitigates legal risks and ensures data compliance. Although data regulations vary from industry to industry, all companies that collect, process, store, and manage sensitive data must ensure that it is protected from cyberattackers.

2017 Cybersecurity Forecast: Cyber Propaganda

In our 2017 cybersecurity series, we’ve discussed a lot of different attack methods used by hackers. Most of the time, these cyberattacks are either financially motivated or a way for hackers to gain notoriety. But this week’s security prediction focuses on threat actors who aim to sway the hearts and minds of the general public by using their talents for cyber propaganda.

2017 Cybersecurity Forecast: BPC Attacks

The definition of breaking into a bank has changed dramatically in recent years. Heists are no longer exclusive to armed robbers and plot points in Hollywood blockbusters. Instead, all it takes to steal tens of millions of dollars is a few cunning hackers who know how to exploit the security vulnerabilities within a financial institution.

2017 Cybersecurity Forecast: Email Attacks

The golden rule of email security is this: If you get an email from someone you don’t recognize, don’t open it. Employees are pretty good at following this rule and keeping an eye out for suspicious hyperlinks and email attachments, ridiculous promotions, and typos.