Cloud

#
A massive global shift to remote working environments has created an open season for cybercriminals. No business—big or small—is safe. Small and medium businesses (SMBs) seemingly have a target on their backs, so strengthening your company’s security posture is essential right now.
Read More >
#
River Run’s R-Security strategy is “an umbrella” that includes a comprehensive Security Foundation Review of physical and virtual cyber threats and vulnerabilities in your office or via those working remotely, and the impact an incident or breach could have on you, your team, your clients, and…
Read More >
#
With over 94% of text messages read and over 45% responded to, it is no wonder why there has been an explosion of “Smishing” (just like e-mail phishing, but by text) in 2020. We have all gotten sick and tired of the daily spam and junk e-mail, so tools and our own common sense have us only…
Read More >
#
In this article, I address growing security issues including, "What is clear is that there is no single framework that can become a magic bullet for an employer to deal with cybersecurity concerns now and in the future. This is truly a risk mitigation game." River Run can help. #cybersecurity…
Read More >
#
If you are truly looking forward rather than reacting, now is a great time for technology cleanups and upgrades.
Read More >
#
Key IT considerations to plan for when employees return to work from corona virus stay-at-home orders: 1) Returning Device Security; 2) Asset Inventory and Future Needs; 3) Software License Inventory; 4) Update Operating Systems and Software; 5) Unregistered Software; 6) Security Scanning,…
Read More >
#
We are living in unique times when people under economic stress do things they normally would not. We are doing what we can to help business owners protect what they have. And, we are not just talking cybersecurity.
Read More >
#
Amidst the coronavirus pandemic, many governments are moving into the “delay” phase of their strategy to fight the virus. This includes social distancing techniques including closing schools and asking people to work from home. Elsewhere, people are having to or opting to work remotely to…
Read More >
#
Best practices and security checklist for working remotely – IT Checklist, Employee Checklist, Awareness
Read More >
#
Why are some companies avoiding 2FA (Two-Factor Authentication) and MFA (Multi-Factor Authentication) as if someone in authority over us is asking us to eat all of our vegetables or take out the trash?
Read More >