Secure Your Accounts Using App-Based Authentications

secure background

By: Alex Weinert In my blog Your Pa$$word doesn’t matter, I laid out the key password vulnerabilities, and in response to a gazillion “but other creds can be compromised, too” DMs and emails, I wrote All our creds are belong to us, where I outlined vulnerabilities in credentials other than passwords and highlighted the promise of passwordless, […]

Ransomware Attacks in Healthcare: Security Tips to Secure Your Organization’s Data

health background

By Puja Mahendru The outbreak of COVID-19 has put cyberattacks on healthcare providers into hyperdrive. Factors contributing to such attacks include, but aren’t limited to: Decentralized business operations Emergency COVID-19 facilities set up without planned security of IT infrastructure A significant rise in the amount of patient health data stored by healthcare organizations Telehealth, and remote […]

How To Create Quick Parts and Distribution Lists in Microsoft Outlook

Message background

Gain Efficiency in Microsoft Outlook It’s easy to get started with Microsoft Outlook for the basics. However, it is important to explore software deeper to take advantage of the productivity features that are built into the product. It is common for users to only latch on to what they need to know right now. They […]

Digital Transformation – New Technologies to Improve Processes

Conections

Copyright AKAVEIL Technologies LLC all rights reserved Written by D. Gowen Business and IT Cadence There is no refuting, the internet has forever changed the way we live, work and conduct business. Innovation has brought the IoT (Internet of Things), digitally enabled services and organizations that are digitally transformed. This means conducting business in significantly […]

Microsoft on the counter-attack! Trickbot malware network takes a hit

microsoft background

Good news, for a while at least. Microsoft went to US District Court for the greater good of all of us and came away with a court order permitting it to take over a whole raft of internet servers. The company was authorized to take over a wide range of IP numbers, effectively ripping them out from […]

The IT Sourcing Model Considerations

IT background

Copyright AKAVEIL Technologies LLC all rights reserved Written by D. Gowen What is IT Sourcing and Why Is It Important? Strategic decisions for the IT service portfolio must include how the services will be executed operationally. This will lead to a discussion and ultimate decision on the sourcing models. What resources for what type of […]

8 tips to tighten up your work from home network

Cyber Security

Earlier this week, we published an article headlined “If you connect it, protect it.” The TL; DR version of that article is, of course, exactly the same as the headline: if you connect it, protect it. Every time you hook up a poorly-protected device to your network, you run the risk that cybercriminals will find […]

Every Business is a Technology Business

technology background

The Technological Revolutions Alaska Air’s CIO, Varesh Sita, was quoted, “Alaska views itself as a tech company with wings.” Why did Ron van Kemenade, CIO of ING Bank state, “IT has become the beating heart of the bank?” An executive leader, Heather Mickman, at Target said, “we are a technology company.” Wait, I am confused […]

Phishing tricks – the Top Ten Treacheries of 2020

Screenshot

Sophos Phish Threat, in its own words, is a phishing attack simulator – it lets your IT department send realistic-looking fake phishes to your own staff so that if they do slip up, and click through… …it’s not the crooks on the other end. The phishing scammers are testing you all the time, so you might as […]

Russian cybercrime suspect arrested in $1M ransomware conspiracy

russian background

by Paul Ducklin Here’s a cybercrime conspiracy story with a difference. When we write about network-wide ransomware attacks where a whole company is blackmailed in one go, two burning questions immediately come up: How much money did the crooks demand? Did the victim pay up? The answers vary, but as you have probably read here on […]