-
IES Cybersecurity Blog: World Backup Day- Why and How to Backup Data Safely
As we approach World Backup Day it’s a great time to review the basics of backing up your data. First, we should break down the concept of a backup and then move on to the importance of keeping secure and up-to-date backups. WHAT IS A BACKUP? A backup is a secondary copy of data. Plain […]
Read more... -
Protect Your Data Blog Series: Focus on IoT Devices
According to the latest Forrester report on the Internet of Things (IoT), the amount of IoT devices installed on business networks is outpacing the number of computers on these same networks. Today, handheld devices, phones, webcams, smartwatches, networked security cameras and even smart refrigerators make 60% of an organization’s network map. 84% of IT security […]
Read more... -
Protect Your Data Blog Series: Focus on Cloud Storage
How much of your data is in your control? Fifteen years ago the answer would have been simple and probably automatic for any IT manager or office worker. The answer would involve hard drives, flash drives, external hard drives or storage devices and in-office settings a company-owned and managed server. The answer has changed, and […]
Read more... -
Protect Your Data Blog Series: Focus on Mobile Apps
Have you downloaded an app without thinking about the developers, country of origin, or how the app developers may capture and use your data? Unfortunately, just about every American with a smartphone has. Don’t feel too bad; we have apps for nearly everything, and many of us require them to complete our job. While Apple […]
Read more... -
Ransomware: A Continuing Threat to Cyber Resiliency
Cyber attacks continue to increase in number and severity. The challenges brought on by COVID-19 have resulted in industries seeing a significant increase in security gaps that attackers are targeting. 2021 has seen many high-profile cyber attacks, including attacks on a Florida water utility company, a US cybersecurity insurance provider, multiple colleges and school systems, […]
Read more... -
Cybersecurity: Start Your Journey
Read more... -
Cybersecurity: DFARS Requirements and CMMC
Read more... -
Cybersecurity: Drive Awareness and Education
Read more...
|