Backup

#
Sick of hearing about the rising tide of ransomware attacks? So is the RTF. The Institute for Science and Technology created the Ransomware Task Force (RTF) in December, drawing delegates from state, national and international government, law enforcement, cybersecurity insurance, security…
Read More >
#
As the old saying goes… It is not IF you and your company will experience a security event, it is WHEN will you experience a security event and how will you respond? This whitepaper has been created to create awareness of Ransomware Security Events that are growing exponentially. The secondary…
Read More >
#
A massive global shift to remote working environments has created an open season for cybercriminals. No business—big or small—is safe. Small and medium businesses (SMBs) seemingly have a target on their backs, so strengthening your company’s security posture is essential right now.
Read More >
#
River Run’s R-Security strategy is “an umbrella” that includes a comprehensive Security Foundation Review of physical and virtual cyber threats and vulnerabilities in your office or via those working remotely, and the impact an incident or breach could have on you, your team, your clients, and…
Read More >
#
Remote workforces and sophisticated hackers change the risks businesses are facing. The COVID-19 pandemic has changed the ways businesses operate. It has also changed the potential security risks that hackers leverage to gain access to corporate data. People working from home and the use of…
Read More >
#
Key IT considerations to plan for when employees return to work from corona virus stay-at-home orders: 1) Returning Device Security; 2) Asset Inventory and Future Needs; 3) Software License Inventory; 4) Update Operating Systems and Software; 5) Unregistered Software; 6) Security Scanning,…
Read More >
#
We are living in unique times when people under economic stress do things they normally would not. We are doing what we can to help business owners protect what they have. And, we are not just talking cybersecurity.
Read More >
#
And so it begins, hackers are using the COVID-19 map to infect your systems and data. Please read and pass along - especially to those you may have working remotely who may get a link like this and download it.
Read More >
#
Protecting business’ internet-connected systems from malicious outside activity is critical in today’s day and age of cybersecurity.
Read More >
#
If you have O365 and your company environment includes departments, or you collaborate in smaller groups for projects, you should be using Microsoft TEAMS and this cool trick!
Read More >