The Crucial Link, part two
How managed services can help your organisation become more cyber resilient. In my last post, I highlighted what organisations can and should do to improve their cyber resilience. Not only…
How managed services can help your organisation become more cyber resilient. In my last post, I highlighted what organisations can and should do to improve their cyber resilience. Not only…
In a world where technology is intertwined with everything we do, the digital domain is often so commonplace we don’t think about it unless something dreadful happens. Who hasn’t had…
Steps to improve your organisation’s cyber resilience. In today’s digital age, businesses rely heavily on technology to drive their operations efficiently and effectively. This dependence on technology has brought about…
In mid-August, state officials in Connecticut began receiving worrisome complaints from constituents about a potentially dire situation unfolding at local hospitals. One such message, from a woman on Facebook, relayed…
October is a busy month for awareness campaigns and Halloween! Perhaps you already knew that October is both Breast Cancer Awareness and Domestic Violence Awareness Month, but did you know…
In my role as an Inside Solutions Architect at 11:11 Systems, my objective is to match 11:11 Systems range of solutions to meet customer’s data protection needs, from simple off-site…
The latest MGM Resorts ransomware attack demonstrates why cyber insurance is critical as part of a multi-layered security strategy. In our last blog, we discussed the recent Las Vegas cyber…
Picture this: Your IT infrastructure is breached by a nefarious actor, who then encrypts critical data and holds your organization hostage until a ransom is paid. Far from hypothetical, this…
In the world of cybersecurity, one thing is certain: no system is immune to vulnerabilities and bugs. Even security software, designed to protect your organization, can have its flaws. But…
True cyber resilience involves much more than having a disaster recovery (DR) solution. That’s because recovery from a typical DR scenario is different than recovery from a cyber event. Why?…