Posted on: May 3rd, 2016 by Wolf TG Admin
When your organization decides to update or implement an information security policy, ensure that this policy provides training for your employees upon how to identify a social engineering attack.
Social engineering is a term that describes the ta ...
Read Full Article
Posted on: April 26th, 2016 by Wolf TG Admin
Cryptographic malware is a new type of virus that is designed to hold your data for ransom. The infection's payload encrypts the data on any hard disks or mapped network drives that the machine is currently using, creating a disaster recovery scenari ...
Read Full Article
Posted on: April 22nd, 2016 by Wolf TG Admin
Over the last 6 months you may have heard about something called Ransomware. We have a blog post coming up on Tuesday, April 26 that will go through it in more detail, but for now I really wanted to reach out and warn you about it and let you know th ...
Read Full Article
Posted on: April 19th, 2016 by Wolf TG Admin
Cyber attacks come in all different shapes and sizes. Hackers routinely target VPNs, websites, and email servers in an attempt to wreak havoc on your network. This leads organizations to ask an important question: Could my business mitigate a cyber ...
Read Full Article
Posted on: April 12th, 2016 by Wolf TG Admin
Shopping for IT services can become a convoluted process. Like many decision makers in the IT world, you've likely come across cloud based services. After reviewing some of these services, you might be left wondering, "What exactly is the cloud and h ...
Read Full Article