Skip links

Tag: higher education

Acronis SCS Higher Education Spotlight

Higher Education Spotlight

In an effort to keep all digital workloads protected and upto-date, whether they sit on campus or in faculty, students', or administrators' homes, higher ed CIOs and IT teams must choose future-proof, affordable, and easy-to-manage cyber protection and imaging solutions tailored to fit their unique
blue chain link

Open Source Backdoors in the Wild

Open Source Backdoors in the Wild Malicious actors will take advantage of any opportunity to exploit an attack vector for money, personal gain, or fun. For years, hackers have used supply chains to deploy backdoors because trusted software provides a relatively easy entry point. This
CyberFit Tips Blog Featured Image

Trick or Treat Yo’self to Our Top 5 Cyberfit Tips

As you get your costumes and candy ready for Halloween, here’s another fun October fact – it’s National Cybersecurity Awareness Month! To help celebrate, Cyberfit Chip’s alter ego, Count Chipula, has turned to the good side this month, so he can offer up key tips to help
Firewall Ports Featured Image

99 Problems but Backup Firewall Ports Aren’t One

How do I love thee network engineer, let me count the ports. 3, that’s right just 3 ports (okay, maybe 5 if you want automated agent installs) you will need to open on your firewalls to get fantastic, fully functional data protection for your entire
Self-Protecting-Data-Diagram Blog Featured Image

Self-Protecting Data – A Future-Proof Cyber Doctrine

The Data Protection Evolution In the decades since cybersecurity became a key priority for companies and federal government agencies alike, we have witnessed a necessary evolution in information security doctrine and strategies. For years, layered data protection tools – from perimeter defense to identity management
CMMC Listening Tour Blog Featured Image

CMMC Listening Tour Takeaways

Last month, I attended one of the stops on the Department of Defense’s (DoD) Cybersecurity Maturation Model Certification (CMMC) listening tour to gain a better understanding of future cyber hygiene expectations for the defense industrial base (DIB). The CMMC, which was first announced in June, is the Department’s fresh
Padlock in blue

Implementing a Secure Approach in a Zero Trust World

The Origins of Zero Trust If you keep pace with cybersecurity trends, you have undoubtedly heard the term “zero trust” with increasing frequency in recent years. The term, first coined by Forrester analyst John Kindervag in 2010, and popularized by Palo Alto Networks in years since, refers to a
Edge Data and Higher Education Blog Featured Image

Neglecting the Edge in Higher Education

During recent discussions with a number of IT decisionmakers across the higher education landscape, an interesting trend emerged. Many of these leaders and their IT teams choose to forego backups of mobile endpoints and edge devices, instead entrusting that responsibility to individual users and employees.