Skip links

Tag: healthcare

CactusCon Blog Banner Acronis SCS

The Upshot: CactusCon 2019

Why Go? Last weekend, a fellow colleague of mine at Acronis SCS and I had the opportunity to attend Arizona’s premier security conference, CactusCon, in neighboring Mesa. The annual event, which began in 2012 and is now the largest conference of its kind in the
Critical Infrastructure Blog Header

Let’s Face It – America’s Critical Infrastructure Is Vulnerable

A Troubling Reality There’s no denying it. In today’s increasingly complex digital landscape, America’s critical infrastructure is more vulnerable than ever to cyber exploitation and attack. It doesn’t help that many of the organizations (both public and private) under the critical infrastructure umbrella lack the
Open Source Backdoors in the Wild Blog Banner Acronis SCS

Open Source Backdoors in the Wild

Open Source Backdoors in the Wild Malicious actors will take advantage of any opportunity to exploit an attack vector for money, personal gain, or fun. For years, hackers have used supply chains to deploy backdoors because trusted software provides a relatively easy entry point. This

Trick or Treat Yo’self to Our Top 5 Cyberfit Tips

As you get your costumes and candy ready for Halloween, here’s another fun October fact – it’s National Cybersecurity Awareness Month! To help celebrate, Cyberfit Chip’s alter ego, Count Chipula, has turned to the good side this month, so he can offer up key tips to help
Blog Banner Suspended Blocks

99 Problems but Backup Firewall Ports Aren’t One

How do I love thee network engineer, let me count the ports. 3, that’s right just 3 ports (okay, maybe 5 if you want automated agent installs) you will need to open on your firewalls to get fantastic, fully functional data protection for your entire
Self-Protecting-Data-Diagram Blog Banner Acronis SCS

Self-Protecting Data – A Future-Proof Cyber Doctrine

The Data Protection Evolution In the decades since cybersecurity became a key priority for companies and federal government agencies alike, we have witnessed a necessary evolution in information security doctrine and strategies. For years, layered data protection tools – from perimeter defense to identity management
Lock Banner Blog Acronis SCS

Implementing a Secure Approach in a Zero Trust World

The Origins of Zero Trust If you keep pace with cybersecurity trends, you have undoubtedly heard the term “zero trust” with increasing frequency in recent years. The term, first coined by Forrester analyst John Kindervag in 2010, and popularized by Palo Alto Networks in years since, refers to a