Blog

Technology expertise, advice and tips

Blog

  1. The Big Business of Ransomware

    Ransomware continues to be one of the most impactful, disruptive, and expensive problems the world faces when it comes to Cyber Crime. This year alone, we have seen major companies like Nvidia, Toyota and SpiceJet become victims of ransomware, and we have also seen an entire country brought to its knees due to an attack. …

  2. WingSwept Ranked on Channel Futures 2022 MSP 501—Tech Industry’s Most Prestigious List of Managed Service Providers Worldwide

    Garner, NC – IT services firm WingSwept, LLC has been selected as one of the technology industry’s top-performing providers of managed services by the editors of Channel Futures. For the past 16 years, managed service providers (MSPs) from around the globe have submitted applications to be included on this prestigious and definitive listing. The Channel…

  3. Best Line of Defense Against Business Email Compromises- $43 Billion Stolen & Counting

    In May of 2022, the FBI published a report stating that Business Email Compromises account for over $43 Billion in losses Internationally.  In the “2022 State of Email Security Report” from Mimecast, a polling of 1400 organizations showed that 96% of the participants had experienced targeted phishing attacks with 79% of organizations seeing heavier email…

  4. What Should You Expect from a Managed IT Service Provider?

    If you’re considering a new Managed IT Service Provider (MSP) for your business, you probably know how difficult it is to assess them objectively.  Many MSPs tout objective measures like Average Response Time and Mean Time to Resolve. These are important measures, but they can be manipulated by responding before a technician is ready to…

  5. 3 Big Security Risks – Ghost Users, Old Data and Home Storage

    As a business leader it can be difficult to decipher what security threats you need to keep a close eye on versus those that are not as likely to impact your organization. That’s especially true these days when you are likely getting hit by a message about how important cybersecurity is nearly every five minutes….

  6. Unpatched Vulnerabilities, New Legislation and the FBI Pushing Against a Ransomware Payment Ban

    The expanding threat landscape is making ransomware one of the few bipartisan issues in Congress right now.  But an FBI expert’s testimony proves there are still no easy answers.  Here are the top cybersecurity stories for small and midsize business executives in late July. Software Vulnerabilities Take 6 Months to Patch A recent study found…

  7. What Is a Perimeter Defense?  Why Can It Be a Problem?

    The explosion of ransomware has many security experts arguing forcefully against a perimeter-only security model.  These experts point out that this approach has led to cyberattacks that have caused billions of dollars of economic damage.  But what is perimeter security?  What does it leave out?  And what should you do instead? Perimeter Defenses, in Buildings…

  8. Technology Downtime: What’s Reasonable? (and What Isn’t?)

    One of the most important jobs of a Managed IT Service Provider (MSP) is to minimize downtime.  Losing even a single workstation can easily cost a business more than a thousand dollars per day of idle time.  When a network outage strikes, or a major server faces a hardware failure, hours of downtime can have…

  9. Ransomware Is Coming. Plan and Prepare.

    Ransomware attacks are so frequent now that even some big ones don’t make headlines.  But last week’s attack on Kaseya VSA, a tool used by IT professionals around the world to help manage networks and provide tech support, garnered plenty of headlines.  That’s because it was the biggest ransomware attack on record, affecting more than…

  10. Double Extortion Attacks More Prevalent than Ever

    Ransomware is still all over the place – attacks are up 62% globally and 158% in North America since 2019.  But ransomware-only attacks have mostly been replaced by more sophisticated – and ruthless – attacks. In a traditional ransomware attack, a cyber criminal finds a way onto business networks (often with stolen usernames and passwords)…