Protecting Your Business from Hackers

posted in: Blog | 0

The Cybersecurity Unit of the Department of Justice (DOJ) recently released an outline of cybersecurity best practices.  The document discusses what to do before and after a cyber-incident.  The DOJ advises you to take specific steps before a cyber-intrusion or … Read More

SECURITY ALERT: Rombertik Malware Destroys Your Hard Drive If Detected

posted in: Blog | 0

A new form of spyware is making headlines.  Rombertik is designed to steal usernames and passwords, but if it finds that its actions are being monitored, it attacks the user’s hard drive. Like other malware including Dyre and Cryptolocker, Rombertik … Read More

IT Disaster Planning: An Essential Element of Data Protection and Business Continuity

posted in: Blog | 0

If your company is like most, it is becoming increasingly dependent on your software applications and electronic documents to conduct business.  Yet, there are so many disasters that can make your data inaccessible to you.  From natural disasters such as … Read More