2304, 2021

Industry 4.0 in a Post-COVID-19 World

By |April 23, 2021|Categories: Security|Tags: , , , , , , , , , , , , |

The COVID-19 crisis stretched manufacturing and other industries to their limits as challenges in the supply chain resulted in shortages of toilet paper, sanitizer, and other critical items. As one data point to the pandemic’s impact, U.S. industrial production dropped 16.5 percent year over year, and U.S. total factory orders [...]

2004, 2021

Understanding Cannabis Cybersecurity

By |April 20, 2021|Categories: Security|Tags: , , , , , , , , , , , , |

With the recent legalizations of recreational marijuana in New Jersey and New York, the cannabis industry is poised to grow quickly.  For the most part, this is excellent news.  However, as the industry grows, so too do opportunities for cybercriminals. Cannabis firms, like many small businesses, are vulnerable to cyber-attack [...]

1304, 2021

Does Your MSP Offer Managed SOC? It Should.

By |April 13, 2021|Categories: Security|Tags: , , , , , , , , , , , |

One of the most significant risks facing SMBs today is a cyberattack, where a single incident could cripple operations or even force it to close doors altogether. Nearly half of all cyberattacks are targeted at SMBs, according to consulting firm Accenture; however, only a fraction of those businesses are prepared [...]

1903, 2021

What SMBs Should Know About Bitcoin

By |March 19, 2021|Categories: Security|Tags: , , , , , , , , , , , , |

Cryptocurrencies like Bitcoin are seeing growing acceptance in the market. More and more businesses offer it as a form of payment. Banks, insurance firms, and investors are all beginning to embrace these alternative forms of payment. While there are many options out there, Bitcoin is by far the most well-known [...]

903, 2021

Is Your SMB Prepared for a Ransomware Attack?

By |March 9, 2021|Categories: Security|Tags: , , , , , , , , , , |

The onset of Covid-19 forced millions of people to work from home, prompting cyber-attacks to reach an all-time high in 2020. Because of this shift, organizations across every industry are more vulnerable to data breaches than ever before, making it easier for hackers to go to work on their systems. [...]

903, 2021

Seven Best Practices for Cloud Migration

By |March 9, 2021|Categories: Security|Tags: , , , , , , , , , , |

Talk with anyone about IT and chances are the word ‘Cloud’ will come up at some point in the conversation.  Even before COVID-19, the Cloud was seen as a way for companies to reduce their IT costs to a more manageable level while increasing access to computing power and resources.  [...]

503, 2021

Teams on Mobile: 3 Tips and Tricks You Should Know

By |March 5, 2021|Categories: Security|Tags: , , , , , , , , , , |

In today’s mobile world, collaboration capabilities aren’t restricted to just your desktop or laptop. Tools like Microsoft Teams also have many capabilities that make it possible to collaborate on the go from your phone or tablet. According to one survey, 48 percent of people use their phones for more than [...]

1902, 2021

What SMBs Should Know About Cybersecurity in 2021

By |February 19, 2021|Categories: Security|Tags: , , , , , , , , |

The last thing SMBs want to deal with in 2021 is cybersecurity, but, sadly, the world we live in demands they do, especially amid a global pandemic. Cybercriminals are using the COVID-19 pandemic to their advantage. There have been 4,000 cyberattacks a day since the beginning of the coronavirus crisis. [...]

902, 2021

Living off the Land – Fileless Malware

By |February 9, 2021|Categories: Security|Tags: , , , , , , , |

The general operating procedure for removing malware is to detect it with anti-viral software, attempt to disinfect the asset, scan again, and, if all else fails, re-image the asset to remove all traces of infection.  However, what happens when you cannot detect the infection for months or even years? Malware [...]

302, 2021

Discovery Assessment FAQs

By |February 3, 2021|Categories: Security|Tags: , , , , , |

Discovery Assessment: Used to conduct an initial evaluation on a client's current security posture.  The assessment provides context around where we, Infoaxis, should be focusing our efforts to meet desired outcomes- whether that’s to increase overall security measures, or helping an organization meet a compliance standard. Some commonly asked [...]

The New Green Standard In Cannabusiness
Seed To Sale Business Solution

Get in touch with IT4cannabis today

Go to Top