Today we will be diving a bit deeper into the considerations that you must take into account when planning backups (and when creating your disaster recovery plan). We previously discussed separation of command and control of backups versus command and control of the systems being backed up. We also discussed the differences between cloud file…
Posts by Nyla Blanding
-
Backups: Myth vs. Reality (Part 3)
-
Backups: Myth vs. Reality (Part 2)
Welcome to Part 2 of the series where we debunk some of the most critical myths about backups. Last time, in Part 1, we talked about separating command and control of your backups from command and control of the systems being backed up. Today we are going to explore services that either claim to include…
-
Backups: Myth vs. Reality (Part 1)
Does your organization have backups? Many may quickly respond with an affirmative response, but they may subscribe to myths about backups. One may say that their critical infrastructure is backed up, check that box, and move on. There are many considerations when it comes to choosing a backup solution, method, and configuration; you want to…
-
The Weakest Link in Your Information Security Chain (Your Users)
What comes to mind when you think about cybersecurity? You may be thinking next-gen anti-virus, next-gen firewalls, Security Information and Event Monitoring services, Security Operations Centers, encryption, SPAM protection, persistent threat monitoring, application whitelisting, DNS-layer protection, and robust backups. If you’ve implemented all of the above, you may think you have covered all your bases;…
-
NIST 800-171, CMMC, and Compliance Issues Affecting Government Contacting Businesses
Doing business with Federal, state, and local governments has become increasingly more difficult for organizations because of increased regulatory and compliance requirements applied to information technology. For nearly 20 years the federal government has been focused on cybersecurity practices of government contractors and protecting data and systems from evolving threats. Many contracts have been updated…
-
Regulatory Compliance Could Be Affecting your Business: Are you Prepared?
Federal, state, and local regulations are constantly changing and are affecting business technology in significant ways. In the world of increased digital information, data leaks, and evolving threats to data, regulatory bodies have placed a microscope on business practices and information technology. Noncompliance with industry regulations can result in significant fines, loss of contracts, tarnished…
-
Data Security & Recycling
With the rise of ransomware events targeting small and medium size businesses, data security has been brought to the forefront of many strategic conversations around the IT “dinner table.” Although there are many palatable security products available on the market to protect and even detect security risks on your network, one mitigation tactic is so…
-
The Big Business of Ransomware
Ransomware continues to be one of the most impactful, disruptive, and expensive problems the world faces when it comes to Cyber Crime. This year alone, we have seen major companies like Nvidia, Toyota and SpiceJet become victims of ransomware, and we have also seen an entire country brought to its knees due to an attack. …
-
WingSwept Ranked on Channel Futures 2022 MSP 501—Tech Industry’s Most Prestigious List of Managed Service Providers Worldwide
Garner, NC – IT services firm WingSwept, LLC has been selected as one of the technology industry’s top-performing providers of managed services by the editors of Channel Futures. For the past 16 years, managed service providers (MSPs) from around the globe have submitted applications to be included on this prestigious and definitive listing. The Channel…
-
Best Line of Defense Against Business Email Compromises- $43 Billion Stolen & Counting
In May of 2022, the FBI published a report stating that Business Email Compromises account for over $43 Billion in losses Internationally. In the “2022 State of Email Security Report” from Mimecast, a polling of 1400 organizations showed that 96% of the participants had experienced targeted phishing attacks with 79% of organizations seeing heavier email…