Uncategorized

How Often Should You Pentest?

  How Often Should You Pentest? Penetration testing is important because it allows organizations to simulate real-world attacks on their systems and networks in order to identify vulnerabilities and weaknesses.  By conducting these tests, companies can take proactive measures to protect against potential security threats. In a previous post, we looked at the difference between …

How Often Should You Pentest? Read More »

Top 10 Immutable Backup Solutions for 2023

Ransomware can be crippling for businesses, big and small, and it’s an escalating threat. Attackers are evolving, learning traditional recovery paths and destroying access to conventional backups, crippling organizations and leaving them at their whim. Fortunately, modern-day protection strategies are maturing, too. No longer is any ol’ data backup good enough—you need a comprehensive cyber …

Top 10 Immutable Backup Solutions for 2023 Read More »

The FAA Outage and the “Cyber Resiliency Gong” That Businesses Need to Hear

  Airiam Field CISO and CIO Art Ocain discusses yesterday’s FAA outage in this short clip. In the video, he looks at how the situation illustrates the dangers of technical debt building up, complex legacy systems, poor documentation, improper backup management, and lack of cyber resiliency planning. Danger of Technical Debt In recent years, there …

The FAA Outage and the “Cyber Resiliency Gong” That Businesses Need to Hear Read More »

How to Recover From a Ransomware Attack with Immutable Backups

Ransomware attacks have been on the rise over the last decade, and businesses have failed to find a one-size-fits-all approach to eliminating the threat. Prevention is better than cure, but with criminal hackers are tenacious and flexibility, it’s not realistic to expect cybersecurity defenses alone to do the trick—you need a plan for how you’ll …

How to Recover From a Ransomware Attack with Immutable Backups Read More »

Patching in VMware

  VMware is Frequent Attack Target Cybercriminals have been targeting VMware and vCenter more than ever, exploiting newly discovered vulnerabilities with ease. Without high availability redundancies in place to facilitate patching, organizations can be particularly exposed to serious cyber risks resulting from their inability to update or secure systems quickly enough. As such companies must …

Patching in VMware Read More »

Why Data Backups Are Important (And How to Do Them Right)

Most businesses know data backups are important, but they still treat them as an afterthought. However, backups aren’t just important—they’re essential.  Losing your system data isn’t just an annoyance or a setback. It could break your business overnight. You might not be able to restore functionality, and customers will lose trust in your company. Customers …

Why Data Backups Are Important (And How to Do Them Right) Read More »

Recent Tech Layoffs Sharply Increase Insider Cybersecurity Threat

As Layoffs Abound, HR and IT Teams Must Collaborate to Deter Insider Cyber Threats Airiam, a managed IT and cybersecurity company with a strong focus on cyber resilience, today revealed an increased risk of insider cybersecurity breaches due to tens of thousands of recent layoffs in the technology sector. As part of Airiam’s ongoing commitment …

Recent Tech Layoffs Sharply Increase Insider Cybersecurity Threat Read More »

Explained: FTC Safeguards Rule Compliance Deadline Delayed

Many companies are facing personnel shortages and supply chain issues that make the December 2022 FTC Safeguard Rule compliance deadline difficult. In response to the current situation and industry lobbying, the FTC extended the compliance deadline to June 9, 2023. While companies might be breathing a sigh of relief, they shouldn’t ignore the vital safety …

Explained: FTC Safeguards Rule Compliance Deadline Delayed Read More »

Cyber Resilience vs. Cybersecurity: Key Differences

Cyber resilience and cybersecurity get bunched together in discussions around digital protection, but they are two separate philosophies. Both are important to understand and implement in your organization. There are overlaps in the implementation of both concepts. At a basic level, cybersecurity establishes a proactive defense against hackers by producing barriers to entry and mitigating …

Cyber Resilience vs. Cybersecurity: Key Differences Read More »