Backup

#
Okay, I have your attention with a flashy title and blast from the past with hamburger icon, Clara Peller, but it is important to share that we need to “beef up” the rhetoric to stop the desensitization to cyber crime. Businesses are dying. Heck, people are dying. Yes, people are dying because…
Read More >
#
Buying cyber insurance can be daunting. And, renewing it at higher rates each year is no picnic either. Not only is there a lot of industry terminology, but understanding your coverages and how your company’s cybersecurity practices factor into the underwriting of your policy can be…
Read More >
#
Sick of hearing about the rising tide of ransomware attacks? So is the RTF. The Institute for Science and Technology created the Ransomware Task Force (RTF) in December, drawing delegates from state, national and international government, law enforcement, cybersecurity insurance, security…
Read More >
#
As the old saying goes… It is not IF you and your company will experience a security event, it is WHEN will you experience a security event and how will you respond? This whitepaper has been created to create awareness of Ransomware Security Events that are growing exponentially. The secondary…
Read More >
#
A massive global shift to remote working environments has created an open season for cybercriminals. No business—big or small—is safe. Small and medium businesses (SMBs) seemingly have a target on their backs, so strengthening your company’s security posture is essential right now.
Read More >
#
River Run’s R-Security strategy is “an umbrella” that includes a comprehensive Security Foundation Review of physical and virtual cyber threats and vulnerabilities in your office or via those working remotely, and the impact an incident or breach could have on you, your team, your clients, and…
Read More >
#
Remote workforces and sophisticated hackers change the risks businesses are facing. The COVID-19 pandemic has changed the ways businesses operate. It has also changed the potential security risks that hackers leverage to gain access to corporate data. People working from home and the use of…
Read More >
#
Key IT considerations to plan for when employees return to work from corona virus stay-at-home orders: 1) Returning Device Security; 2) Asset Inventory and Future Needs; 3) Software License Inventory; 4) Update Operating Systems and Software; 5) Unregistered Software; 6) Security Scanning,…
Read More >
#
We are living in unique times when people under economic stress do things they normally would not. We are doing what we can to help business owners protect what they have. And, we are not just talking cybersecurity.
Read More >
#
And so it begins, hackers are using the COVID-19 map to infect your systems and data. Please read and pass along - especially to those you may have working remotely who may get a link like this and download it.
Read More >