3 Tips to Help You Prevent, Detect and Recover from Ransomware Attacks

Posted on October 18, 2022 by Vito Nozza

The Current State of Ransomware

Many cyberattacks involve ransomware, a form of malicious software or malware, designed to deny access to a computer system or data until a ransom is paid and a decryption key (commonly called a decryptor) is given to the victim. The encryption is virtually unbreakable without the decryption key, and you should not spend valuable time seeking a way around the encryption if you are attacked with it. Ransomware can spread in multiple ways, but most typically, through phishing emails or by unknowingly visiting an infected website. Ransomware can be catastrophic to healthcare (along with many other industries), preventing critical information and systems for patient care from being accessed, for example.

Read More

October is Cyber Security Awareness Month. What's Your Plan?

Posted on October 4, 2022 by Chris Ripkey

If you thought last year was a challenging year for cyber security, 2022 is proving to be even more difficult. Weekly cyberattacks jumped 42% across the globe this year, according to CheckPoint Research. The list of threats is long: supply chain attacks, ransomware threats, attacks on Costa Rican and Peruvian governments, and the fallout of perhaps one of the most serious zero-day vulnerabilities in history, Log4j, followed by the impact of the Russia-Ukraine war.

Read More

How to Prevent Data Loss Within the Cloud

Posted on September 27, 2022 by Vito Nozza

There are good reasons most large enterprises worldwide are quickly adopting the cloud for everything from sales contracts and product specs to videos and overall business operations. The cloud offers flexible, scalable, and cost-effective computing that cuts down IT costs, consolidates data centers, accelerates growth and enables digital transformation. Migration to the cloud has accelerated in the post-pandemic hybrid work world and more recently as companies battle inflation and rising real estate costs.

Read More

WATCH NOW: The City of Henderson's Rapid Network Deployment

Posted on August 30, 2022 by C1

The City of Henderson, Nevada, serves 320,000 residents. ConvergeOne became the city’s go-to networking partner after supporting a firewall transition, assisting with training, implementation and long-term strategic planning for leveraging new technologies. ConvergeOne also helped set up rapid deployment kits that allowed the city’s emergency management and safety department to quickly and efficiently deploy COVID testing and inoculation centers.

“Having rapid deployment kits and partnering with ConvergeOne made us able to be heroes for city management and the activities that they want to do, and for our office of emergency management and safety to be able to deploy rapidly,” said Jared Hansen, IT Infrastructure Manager, City of Henderson, Nevada.

Read More

A Modern-Day Revolution: How AI Could Transform Healthcare

Posted on July 26, 2022 by Ben Prescott

This article originally appeared in VentureBeat.

Read More

3 Key Considerations for Cyber Security in the Age of Cloud

Posted on July 7, 2022 by Chris Ripkey

This article originally appeared in Security Magazine.

The past two years have seen a drastic shift in the way we work, with many organizations having to quickly make the move from an office-based environment to a hybrid work environment. Now, with hybrid ways of working becoming standard, leaders are focusing on digitally transforming their businesses to adapt to and compete in the new normal. Yet in the rush to adjust, they can forget a foundational and business-critical issue – cyber security.

Read More

Make Lemonade from Supply Chain Lemons [Part 1]

Posted on July 5, 2022 by Sean Mathias

While there is no question that supply chain issues have emptied the whole toolbox into our collective gears, upending the most well-laid plans, this doesn't have to be the whole story: there is a silver lining to be found if you look for it.

Read More

3 Steps to Realizing Disaster Recovery

Posted on June 23, 2022 by Tom Burge

With the looming threats of natural disasters and cyber disasters like ransomware, organizations need to position themselves to defend against constant threats while still providing value to their customers.

Read More

Network Modernization Planning, 2022 Edition

Posted on June 14, 2022 by Sean Mathias

How are we still talking about network modernization in 2022, you might ask? That is a fair question. The simple answer is that most companies and enterprises have yet to begin the process of modernization in earnest and instead continue down the well-worn path of early 2000s networking.

Read More

4 Resources to Elevate Your Cybersecurity Efforts

Posted on April 26, 2022 by C1

With a record number of cyberattacks making national news, cybersecurity is top-of-mind for many business executives. Cyberattacks are becoming more complex, with new and improved malicious software evading detection systems and disabling or hindering business operations for organizations across the globe. An effective cybersecurity strategy begins with an understanding of the threat landscape, but it is only the first step. You must take proactive measures to ensure your organization is prepared for the inevitability of facing cyberthreats.

Read More