Illinois Election System Breached

This election cycle has provided more than a few noteworthy headlines. Some of the most recent, however, don’t comment on the candidates, but rather provide a real-life lesson in cybersecurity preparedness. State and federal officials confirmed that Illinois’ state voter system had been breached earlier this year. Worse still, the Prairie State wasn’t the only […]

Posted in Untangle | Tagged , , , , , , | Comments Off on Illinois Election System Breached

How hospitals can get control over their sprawling networks

Hospitals are more commonly embracing digitalization and the benefits of our increasingly connected world. Whether due to pressure from government regulations such as the Health Insurance Portability and Accountability Act (HIPAA) or the ongoing goal to improve patient care, the health care industry’s investment in IT and network technology has risen significantly as of late. According […]

Posted in Untangle | Tagged , , , , , , , | Comments Off on How hospitals can get control over their sprawling networks

How to keep ransomware attacks away from backups

Since its emergence,  the numerous variants of ransomware have wreaked havoc on networks and computers worldwide. By encrypting files and not releasing them until a ransom is paid, ransomware has proven to be especially effective and lucrative for cybercriminals. Even backups are no longer safe from ransomware. But, with a little knowledge and the right […]

Posted in Untangle | Tagged , , , , , , , | Comments Off on How to keep ransomware attacks away from backups