Company Upgrades Internal Security Technology with Minimal Downtime

Pam Roman

With Our Help, Global Payments Company Becomes Early Adopter of Upgraded Technology  Our Client  Our client is a global technology company (GTC) in the payments industry, with the principal business of processing credit card transactions. Our client must be able to authorize a transaction – approve a card tap, chip or swipe – from any one of millions of acceptance … Read More

Stay Safe: Look Out for Ransomware and Phishing

Vikesh Kaushal

By Ranga Yarlagadda Deputy General Manager- Global IT at Prolifics There are a lot of different cyber-attacks that people are unaware of. Here are two of the most common:  Ransomware and phishing are methods hackers use to extort money online. Ransomware is a type of malicious software that prevents you from accessing your computer until you pay a ransom. Phishing … Read More

Why You Need a Cyber Risk Assessment

Pam Roman

As the past few years have shown, cybersecurity threats are on the rise and affect every business sector across the board. The performance of a Cyber Risk assessment will allow your organization to identify, understand and mitigate risk within your environment. The National Institute of Standards and Technology (NIST) defines Risk Assessment as “The process of identifying risks to agency … Read More

You Have a Cybersecurity Plan – But How Do You Know It Works?

Pam Roman

Enterprise cybersecurity programs take many forms to address unforeseen – and hopefully never occurring – data intrusions into your network. You’ve authored policies and implemented systems, but ultimately time passes. When was the last time your organization tested the cyber readiness of your team? When did you last measure the responsiveness to an attack on your computer network? A “tabletop … Read More

Yes – Ransomware is Still a Thing

Pam Roman

Protect Your Company News report: “Universal Health Services, one of the largest healthcare providers in the U.S., has been hit by a ransomware attack.” In a ransomware attack, the bad guys probe for vulnerabilities in the target’s computer system. Once in, they enter code that encrypts files, rendering them inaccessible. The hackers will send a decryption key only after the … Read More