Security
Recently, there was a security incident that forced Rackspace to shut down its hosted Exchange environment for an extended period of time. The mitigating solution was to give customers free access to Microsoft 365 for…
Attitudes toward cybersecurity responsibility are shifting worldwide. Impacts of successful breaches can be seen across the globe, challenging nearly every public and private industry. The financial services sector needs to be especially vigilant and prepare…
Businesses are rarely successful without the ones steering the ship having the ability to make great decisions. Whether it’s managing your workforce, supporting your customers, or procuring the right equipment to best facilitate productivity, good…
Amidst Russia’s attack on Ukraine, one may find it unsurprising to hear of Russian cyberattacks targeted at weakening infrastructure in Ukraine. While some efforts have successfully infiltrated Ukrainian networks and wreaked havoc on the lives…
Phishing attacks are serious business, so it is important that your team members know what they are, for one, and know how to spot them. To facilitate this, let’s review the signs of a phishing…
Multi-factor authentication (MFA) is no longer an ‘extra’ security measure only necessary for those working with sensitive information. In days past we were able to lock down our accounts with just a simple password, but…
“IT departments are for a bygone era and are ill-suited to the demands of a digital-first world.” Joe Peppard makes some compelling arguments in his article “It’s Time to Get Rid of the IT Department”…
Normally, I am not a fan of year-end predictions, but as of late I have found them to be a good way to reflect upon what we have seen in terms of cyber security and…
With November 30th being National Computer Security Day, the Thrive team is sharing some of their most recent pieces as a quick refresher on some of the most critical parts of any cyber readiness strategy.…
Over the last few years, a big theme in technology has been, “this is the year that passwords die.” Then somehow, someway, they continue to be a part of our lives. Over time we have…
Criminal Justice agencies, ranging from local police departments to the FBI, document various aspects of criminal justice information (CJI). This may include fingerprints, body-worn camera footage, or a facial recognition gallery made up of mugshots…