Select Page

Archive - Tag: Cybersecurity | NC State Industry Expansion Solutions


  • Protect Your Data Blog Series: Focus on Cloud Storage

    How much of your data is in your control? Fifteen years ago the answer would have been simple and probably automatic for any IT manager or office worker. The answer would involve hard drives, flash drives, external hard drives or storage devices and in-office settings a company-owned and managed server. The answer has changed, and […]

      Read more...

  • Protect Your Data Blog Series: Focus on Mobile Apps

    Have you downloaded an app without thinking about the developers, country of origin, or how the app developers may capture and use your data? Unfortunately, just about every American with a smartphone has. Don’t feel too bad; we have apps for nearly everything, and many of us require them to complete our job. While Apple […]

      Read more...

  • Protect Your Data Blog Series: Focus on Cyber Risk

    Did you know that 43% of cybercrime targets small businesses? There has been significant growth of cybercrime against small companies since 2020; the rate of cyber attacks against small businesses has risen over 424% (Shepherd). Nearly 80% of IT security leaders do not have confidence in cyber protection within their organizations. (78% Lack Confidence) Perhaps […]

      Read more...

  • Ransomware: A Continuing Threat to Cyber Resiliency

    Cyber attacks continue to increase in number and severity. The challenges brought on by COVID-19 have resulted in industries seeing a significant increase in security gaps that attackers are targeting. 2021 has seen many high-profile cyber attacks, including attacks on a Florida water utility company, a US cybersecurity insurance provider, multiple colleges and school systems, […]

      Read more...

  • IoT Devices and Cybersecurity

    You may be asking, what is IoT? IoT stands for the Internet of Things, which in simple terms, is a broad descriptor for the various connected devices (things) that are tied to your network. The number of IoT devices, such as smart devices or sensors that can connect to our networks is growing rapidly. According […]

      Read more...

  • Preparing for Cybersecurity Requirements

    Have you seen cybersecurity requirements listed in contracts for work within your supply chain or government contracts? If you are bidding for DoD or government contracts, you will find cybersecurity requirements listed in the DFAR or FAR regulations; in the near future, DoD contracts will require Cybersecurity Maturity Model Certification (CMMC). You will also see […]

      Read more...

  • The Emerging Threat Of Ransomware

    The threat of cyber attacks is at an all-time high and growing; the financial implications are continuing to rise as well.  Cybersecurity Ventures, a leading research organization of the global cyber economy, predicts that cybercrime damages will cost the world $6 trillion annually by 2021, doubling $3 trillion spent in 2015.  Deputy Attorney General Rod […]

      Read more...