#DataProtection #DataRecovery #Cloud #Abtechtechnologies #itsupport

The best way to mitigate damage from a cyber-attack.

Dell EMC PowerProtect Cyber Recovery Cybercrime has been dubbed the largest transfer of wealth in history. According to Accenture, cybercrime will put $5.2 trillion worth of global wealth at risk over the next five years. Regardless of the industry or size of the organization, Cyber-attacks constantly put businesses at risk of loss of revenue, loss …

The best way to mitigate damage from a cyber-attack. Read More »

Everyday tips that help you identify a phishing attempt

Phishing is one of the most common types of cyberattacks aimed at stealing your money or identity by means of obtaining your personal information and using it to access your accounts. This type of cybercrime is present on all popular communication media, ranging from social networks all the way to emails, phone calls or even …

Everyday tips that help you identify a phishing attempt Read More »

Prevent, Protect and Mitigate Cyber Attacks

An anatomy of a real attack User targeted by spam email. User engaged with hacker and their local laptop was compromised.  The hacker then used the VPN connection on the laptop to access the corporate network.  With access to the network the hacker started a network discovery sweep. One spreadsheet with admin credentials was found.  …

Prevent, Protect and Mitigate Cyber Attacks Read More »

6 common items that help identify a phishing attempt

What is Phishing? Phishing is a cybercrime in which a target or targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.  Generally, emails sent as phishing attempts are masked …

6 common items that help identify a phishing attempt Read More »

Five Things You Need to Know About Hardware Maintenance and Mission-Critical IT Infrastructure Management

Your data center infrastructure is mission critical and needs to be managed using best practices. Here are five critical areas you need to focus on: What and where are your mission-critical IT infrastructure assets? Simple as it sounds, keeping an up-to-date asset inventory of critical IT data center and remote location assets is anything but. …

Five Things You Need to Know About Hardware Maintenance and Mission-Critical IT Infrastructure Management Read More »