Blog

Technology expertise, advice and tips

Posts by Nyla Blanding

  1. Strengthening Password Security

    In today’s high-frequency cyber-attack landscape, protecting your passwords is paramount for strong cyber security. Recent concerns and data breaches have brought password managers into the spotlight. LastPass, a popular password manager, faced scrutiny due to a breach that raised questions about their security. While it is a valid concern, abandoning password managers entirely is not…

  2. Data Backup: Myths vs. Reality

    Does your organization have backups? Many may quickly respond with an affirmative response, but they may subscribe to myths about backups. Someone may say, “Back up their critical infrastructure, check that box, and move on.” When choosing a backup solution, method, and configuration, it’s crucial to make the right considerations. Critical Foundation: Separation of Control…

  3. Security Awareness Training: Users = Weakest Link in Cybersecurity

    The weakest link in your information security chain is your users. Your employees, your team, and your family are the primary targets of cyberattacks. They are the ones who are most likely to click on a malicious link, open an infected attachment, or give away their passwords. That’s why security awareness training is so important….

  4. The Growing Importance of Cybersecurity Compliance for Government Contractors

    The increasing regulatory and cybersecurity compliance requirements for information technology have made it difficult for organizations to do business with government agencies. The federal government has been particularly focused on cybersecurity for nearly 20 years, and many contracts now explicitly require specific cybersecurity practices. Some of this language is vague, while other contracts are more…

  5. Regulatory Compliance Could Be Affecting your Business: Are you Prepared?

    Federal, state, and local regulations are constantly changing and are affecting business technology in significant ways. In the world of increased digital information, data leaks, and evolving threats to data, regulatory bodies have placed a microscope on business practices and information technology.  Noncompliance with industry regulations can result in significant fines, loss of contracts, tarnished…

  6. Data Security & Tech Recycling

    The rise of ransomware attacks targeting small and medium businesses has made data security a top priority for IT leaders. While there are many security products available to protect and detect threats, one simple but often overlooked mitigation tactic is proper tech recycling policies. When disposed of improperly, old IT equipment can pose a security…

  7. The Big Business of Ransomware

    Ransomware has emerged as one of the most pervasive and costly challenges in the world of cybercrime. With major companies like Nvidia, Toyota, and SpiceJet falling prey to ransomware attacks, the threat has escalated to new heights. Even entire countries, like Costa Rica, have faced crippling consequences due to these malicious attacks. As the landscape…

  8. WingSwept Ranked on Channel Futures 2022 MSP 501—Tech Industry’s Most Prestigious List of Managed Service Providers Worldwide

    Garner, NC – IT services firm WingSwept, LLC has been selected as one of the technology industry’s top-performing providers of managed services by the editors of Channel Futures. For the past 16 years, managed service providers (MSPs) from around the globe have submitted applications to be included on this prestigious and definitive listing. The Channel…

  9. Best Line of Defense Against Business Email Compromises

    The Cost of Business Email Compromise In May of 2022, the FBI published a report stating that Business Email Compromises account for over $43 Billion in losses Internationally.  In the “2022 State of Email Security Report” from Mimecast, a polling of 1400 organizations showed that 96% of the participants had experienced targeted phishing attacks with…