<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=446209&amp;fmt=gif">

Industry Info to Know – 06.26.20 Roundup

By Kerry Cotter |   Jun 26, 2020

We're all in IT together.

Security is still top of mind for executives as the nation (and world) continues to navigate uncertainties brought upon us all by the pandemic. More specifically cloud security and security at the edge are where CIOs are prioritize efforts, and spend according to several studies that are referenced in the articles below. Leading vendors of enterprise IT solutions regonized this emerging trend early-on and have rolled out product improvements or new solutions all-together to help companies more effectively secure their enterprise endpoints as their employees work from anywhere.

Cyber Security Readiness - where do you stand?

By Greg LaBrie |   May 14, 2020

Cyber threats are not new just because more people are working from home. Attacks on your network happen every day, and did long before the COVID-19 pandemic.

Build Your Ransomware Strategy Before You Need It

By Jay Cardin |   Jun 18, 2019

From news headlines to television sitcom story lines, ransomware has become a major player in the world of IT security. High-profile attacks against enterprises are on the rise, their numbers dramatically increasing every year with nearly two-thirds of organizations surveyed reporting an attack in the last year, and 22 percent reporting weekly attacks.

Managing Ransomware Attacks: The Best Offense Is A Good Defense

By Michael Thweatt |   Oct 16, 2018

Popping up on prime time television and local news reports, ransomware is so commonplace it has practically become a household phrase. The frequent attacks have made it a focus area for many enterprises because high-profile attacks against them have risen dramatically in the past few years.

3 Critical Tips for Mitigating CPU Vulnerabilities [Meltdown and Spectre Update]

By David Fafel |   Jan 18, 2018

It’s been two weeks since the IT world was rocked by the news of the CPU vulnerabilities known as Meltdown and Spectre. It’s making headline news due to how far the vulnerabilities extend—to nearly every processor manufactured over the past 20 years—as well as the potential impacts in mitigating these vulnerabilities. Every server, computer, tablet, phone or any other computing device with a modern CPU is potentially affected. (See WEI’s Customer Advisory about Meltdown and Spectre in this blog post.)

The Future of Cybersecurity: 6 Predictions for 2018

By Greg LaBrie |   Jan 16, 2018

Happy New Year! As we say hello to 2018, we can reflect on the massive progress technology made throughout 2017. The cloud came to a new level of maturity, cybersecurity incidents rocked the world and organizations embraced hyperconverged infrastructure as the future of data center modernization. But what lies ahead? Read on for a look at cybersecurity predictions for the coming year.

WEI Customer Advisory: The Meltdown and Spectre Vulnerabilities

By David Fafel |   Jan 05, 2018

WEI is aware of the new vulnerabilities related to Intel and other CPUs which could potentially allow an attacker to gather privileged information from CPU cache and system memory, putting enterprise security at risk. The vulnerabilities are code named “Meltdown” and “Spectre." The “Meltdown” issue is reported to only affect Intel CPUs while “Spectre” is reported to affect Intel, AMD, and ARM. The impact of these vulnerabilities could extend back to CPUs from as early as 1995 (in the case of Intel).

Stop Ransomware in Its Tracks with These 5 Tips

By Greg LaBrie |   Aug 22, 2017

Did you catch our previous advice for avoiding and containing ransomware? Today’s digital businesses are facing this pervasive threat like never before, and there are a wide variety of security tactics that can improve your security strategy. Keep reading for five more tips that will help you avoid a destructive ransomware attack.

How to Combat Ransomware Threats: 4 Enterprise Security Tips

By Greg LaBrie |   Aug 15, 2017

If organizations weren’t serious about tightening their cybersecurity strategy to combat ransomware within the past sixteen months, the mammoth WannaCry attack launched against the world on Friday, May 12, 2017 has certainly induced them to do so. Like most enterprise security threats, there are multiple ways to combat ransomware. Some methods are more intrusive than others though.

How to stop the latest cyber security threat, “Petya”

By Michael Thweatt |   Jun 29, 2017

Remember the destruction WannaCry caused? The casualties included up to 300,000 encrypted computers in over 150 countries, not to mention the damage or loss of data entirely. The newest ransomware cyber-attack threat is far worse than WannaCry, and it's going by the name “Petya.”

    About WEI

    WEI is an innovative, full service, customer-centric IT solutions provider. We're passionate about solving your technology challenges and we develop custom technology solutions that drive real business outcomes.

    Subscribe to WEI's Tech Exchange Blog


    Categories

    see all
    Contact Us
    Our commitment to your projects is absolute and unwavering. Read WEI's official statement regarding COVID-19