You invested in strong endpoint detection, conducted robust training on spotting a phishing attempt and conduct a thorough patch management program, but it happens away: your organization is locked out of its systems until you pay a hefty ransom of Bitcoin to an unknown cybercriminal. Now what do you do? If your backups were stored […]
Best of Tech Decisions
Learn about hybrid learning environments and ways for funding these programs from Crestron representatives on AVI-SPL’s Collaboration Space podcast.
YMCA increases its energy efficiency with updated HVAC systems after a three week installation and a new energy-as-a-service plan with Budderfly
Heinan Landa, founder of Optimal Networks, joins the podcast to talk about what IT professionals can do to manage the transition back to the office.
As end users begin to transition back to the office – at least part of the time – the IT department is now tasked with making sure devices that were taken home are accounted for and that each employee has the tools they need to work regardless of where they actually work. Many organizations invested […]
All of these news headline about cyberattacks, nation-state actors and ransomware are daunting, and they’re probably keeping IT professionals and executives up at night, thinking about when they’ll wind up in those headlines themselves. In today’s business climate, all eyes are on cybersecurity. For the most part, organizations investing heavily to secure their IT environment […]
On this episode of the My TechDecisions Podcast, we speak with Om Moolchandani, Co-founder, Chief Technology Officer and Chief Information Security Officer at Accurics, a cloud cyber resilience company, about President Joe Biden’s executive order on cybersecurity. Biden signed the order in May to modernize federal cybersecurity and implement concepts like Zero Trust and multi-factor authentication, […]
All eyes are on cybersecurity, with news headlines dominated by the recent compromise of technology products and several high-profile ransomware attacks against infrastructure and health services. However, five new attack techniques have surfaced as the most dangerous in today’s IT climate, and your organization needs to act now to protect against these threats, according to […]
James Carder, CSO at cybersecurity provider LogRhythm, joins the podcast to talk about recent ransomware attacks against critical infrastructure.
It’s no secret that SaaS apps like Zoom, Slack, Google Workspace, Box, Office365 and many more help organizations optimize their workflow, but inherent risks must also be avoided.