Microsoft Exchange Hack: What We Know So Far
As you may or may not be aware, tens of thousands of organizations’ on-premises Exchange servers have been exploited as a result of a recently disclosed set of vulnerabilities. Watch the video below for more information on what we currently know. To get further details on this hack check out Microsoft’s blog about it. If […]
Top Cybersecurity Concerns for Businesses in 2021
The changes and impacts on our day-to-day lives due to the challenges of this past year are something that as a society we are still working on understanding. However, one thing that is abundantly clear after 2020 is that in both our day-to-day lives and in business we are all increasingly reliant on technology. What […]
Dramatic rise of cyber attacks on the healthcare industry continues
In October 2020 the FBI, CISA, and HHS released a joint statement warning of the imminent threat of increased ransomware attacks on the U.S. healthcare system, which we discussed in detail in this blog. In the two months that have followed since that initial warning, cyber attacks on the healthcare industry have continued to grow […]
FBI warns of the imminent threat of ransomware attacks on the U.S. healthcare system
On October 28 2020 the FBI released a statement warning of an increased threat of ransomware attacks on the U.S. healthcare system. See the full statement here. This increased level of threat continues a trend of increasingly bold and costly ransomware attacks “The U.S. has seen a plague of ransomware over the past 18 months […]
What You Need To Know About Mobile Device Management
What do you get when you cross personal mobile devices with end users who want corporate email? The perfect recipe for a cyberbreach with serious consequences ranging from impersonation and ransomware to stealing company information and even wire fraud. Despite it happening every day mobile devices are often overlooked as a point of concern for […]
Greystone Technology Hosting Virtual Roundtable Discussions
Although there are plenty of upsides to attending a large conference, like networking opportunities, there are also plenty of downsides beyond the predictably terrible food. One of the biggest downsides is that it is difficult to have a real conversation with any of the people selected to be presenters. The goal of these roundtables is […]
What is the fastest way to improve protection against ransomware – Monday Minute #13
Crafting the right Cybersecurity strategy is a challenge for many businesses, especially given that the threat landscape is constantly shifting. In this edition of the Monday Minute, we dive into what companies can do in 2020 to better protect themselves.
Why is there no longer a “one-size-fits-all” approach to Cybersecurity – Monday Minute #12
Does it seem like you constantly are having to add new layers of cybersecurity protection? Find out why on this edition of the Monday Minute.
How To Start Thinking About Business Continuity and Disaster Recovery
Most people are scared of catastrophe, but human nature leads most people to avoid thinking about it deeply enough to plan the right solutions. I’m not that person. I think of disasters all day every day. (Insert joke about my psychological make-up here) Having a plan is often the reason a business does or does not survive when a crisis occurs, but most people don’t know where […]
Which layer of cybersecurity protection is most important – Monday Minute #11
Find out more about what Greystone Technology currently recommends for cybersecurity protections in this edition of the Monday Minute.