Safeguard your data against a ransomware attack with these ten data protection principles

Last month, it was announced that a vulnerability in a remote management and monitoring tool utilized by many managed service providers (MSPs) had been exploited to launch a massive ransomware attack that impacted not only those MSPs but possibly their…

Government Digital Transformation and Modernization in Just Three Easy Steps

The need for modernized information technology at government agencies is long-established, but progress toward transformation is often slow-moving. As recently as 2019, the Government Accountability Office found that 10 critical systems at 10 agencies were eight to 51 years old.…

Cloud security starts with employee training

This article was authored by Anuradha Nandan of ExitCertified and originally published on the Tech Data Blog. Click HERE to read the original article in its entirety. According to a study commissioned by the Federal Risk and Authorization Management Program, roughly half…

Zero Trust: Buzzword or hack-buster?

Trust but verify: a Russian proverb Ronald Reagan often used to characterize U.S.-Russia relations, especially regarding nuclear weapons. The Internet has made it clear that the “trust” part of the proverb may not work so well. Today, we may have…

Zero Trust: Buzzword or hack-buster?

Trust but verify: a Russian proverb Ronald Reagan often used to characterize U.S.-Russia relations, especially regarding nuclear weapons. The Internet has made it clear that the “trust” part of the proverb may not work so well. Today, we may have…