Blog

When Cyber-Attacks Succeed: Lessons Learned from the Colonial Pipeline Company Breach

February 14, 2022

Cybersecurity attacks on IT infrastructure have become an increasingly legitimate and immediate threat for businesses in the past few years.  With the world becoming more technology reliant with each passing day, failure of operations due to a security compromise cause…

Read More

The Fundamentals of Cybersecurity

February 14, 2022

You may have heard of the CIA triad before, but, as is so often the case with such “technojargon”, you may find yourself asking: “What does it really mean to me?” Cybersecurity has three fundamental elements that comprise what is…

Read More

The Human Firewall: Why?

February 14, 2022

Bad actors are getting smarter and more organized at their craft. Ransomware, Business Email Compromise (BEC), CEO Fraud, spearphishing, vishing… attack vectors are ever-evolving.   The solution? Security awareness training and development of a a security-aware culture. Whether you’re just starting…

Read More
Allied IT Systems

Types Of Malware

January 6, 2022

Malicious software—or malware—is used by threat actors to access and infect a computer or network without being detected. Terms like viruses, adware, spyware, ransomware, worms or Trojan horses; these are all different types of malware that can severely damage your…

Read More
Allied IT Systems

Securing Your Business: The Basics of Employee Cybersecurity Training

January 6, 2022

Have you heard the stories about cyber criminals dumping thumb drives loaded with malicious code in employee parking lots waiting for one to be picked up and plugged into a work computer? Pretty clever, right? Unfortunately, studies have found that…

Read More