10 Critical Steps to Survive a Ransomware Attack, Step 6: Restrict Access to File Shares (aka “Silo Your Data”)

Posted Posted in Ransomware, Security, Uncategorized

10 Critical Steps to Survive a Ransomware Attack, Step 6: Restrict Access to File Shares (aka “Silo Your Data”) Most small firms we work with have a single file repository on their network, and every staff member has full access to it, and all of its contents. This means that anyone, from the CEO all […]

10 Critical Steps to Survive a Ransomware Attack, Step 4: Configure Your Firewall to Filter OUTbound Traffic.

Posted Posted in Ransomware, Security, Uncategorized

A firewall is a type of security device that blocks network traffic to and from unauthorized sites, and allows traffic to authorized sites. Firewalls range from high end devices designed to protect the likes of Amazon and Facebook, down to SOHO (Small Office/Home Office) devices from Linksys. While there is a tremendous range of features […]

10 Critical Steps to Survive a Ransomware Attack, Step 2: Patch, Patch, Patch.

Posted Posted in Ransomware, Security, Uncategorized

What are software patches? Patches are fixes for “bugs,” or flaws in programs. While some people still like to say “computers don’t make mistakes,” one must remember that computers are designed, built, and programmed by humans… and humans certainly make mistakes. Software patches are created when a problem is found, and the author of the […]

498/499 (E-rate) application deadlines are upon us!

Posted Posted in Uncategorized

E-rate is a popular federal program to provide funding for schools and libraries for technology and telecommunications projects. There’s a lot of paperwork involved, and some pretty strict deadlines, which are rapidly approaching. If you are involved in technology acquisition for your school or district, be sure to pay attention to these: DUE ITEM More […]