Search
Close this search box.
Latest & Greatest Post

Customer Service in IT Services

Read More
Vivian Lee
Most Recent
Search

How Often Should You Pentest?

  How Often Should You Pentest? Penetration testing is important because it allows organizations to simulate real-world attacks on their systems and networks in order to identify vulnerabilities and weaknesses.  By conducting these tests, companie
Avatar photo
Art Ocain
>>Read More

Top 10 Immutable Backup Solutions for 2023

Ransomware can be crippling for businesses, big and small, and it’s an escalating threat. Attackers are evolving, learning traditional recovery paths and destroying access to conventional backups, crippling organizations and leaving them at their whim.
Jesse Sumrak
>>Read More

The FAA Outage and the “Cyber Resiliency Gong” That Businesses Need to Hear

  Airiam Field CISO and CIO Art Ocain discusses yesterday’s FAA outage in this short clip. In the video, he looks at how the situation illustrates the dangers of technical debt building up, complex legacy systems, poor documentation, improper back
Avatar photo
Art Ocain
>>Read More

Podcast: 2023 Resolutions for Resilience

 Episode Summary People often make resolutions and set goals for the new year. In our first episode of 2023, we sat down with 13 IT and cybersecurity experts from Airiam, Secureworks, and Corvus Insurance. We wanted to know what their resolutions are
Avatar photo
Bill Bowman
>>Read More

How to Recover From a Ransomware Attack with Immutable Backups

Ransomware attacks have been on the rise over the last decade, and businesses have failed to find a one-size-fits-all approach to eliminating the threat. Prevention is better than cure, but with criminal hackers are tenacious and flexibility, it’s not
Jesse Sumrak
>>Read More

Internal vs. External Penetration Testing Discussed

  What Does Penetration Testing Do and Why Is It Important? Everyone says an organization should conduct a penetration test. But some companies don’t care about it. Some people are not sure how often to a conduct a penetration test. Let’s just ste
Avatar photo
Art Ocain
>>Read More

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.