Judging by the daily reports about what’s happening in the digital world, the risk of cyberattacks is at an all-time high. Furthermore, with growing compliance regulations, it’s crucial to address vulnerabilities before they lead to devastating breaches or costly...
An IT Audit Covers about 60% Your InfoSec Posture One of the most common conversations I have with Boards and Senior Leadership is regarding broad assumptions that their IT audit or regulatory exam is a sufficient measurement for the effectiveness of their information...
Heightened Ransomware Activity on a Global Scale In a digital age where the boundaries between the physical and virtual worlds blur, security of our data, protection of our brands, and a clear understanding of our risk postures has never been more critical. The recent...
M365 and Email Security In my last post, I discussed the risks of storing your data in a legacy archive repository that is end-of-life, broken, or somehow inaccessible. I’d just finished retrieving data stored in an unsupported platform for a client faced with a...
Extreme? I don’t think so. If your data is stored in a platform that is not supported, end-of-life, broken, or inaccessible in some way, it might as well be burning to the ground. That’s the reason for this article. In addition, I wanted to share with you a...