Month: August 2014

How to handle DDoS Attacks

Distributed denial of service attacks (DDoS) are on the rise — and the hackers that launch these attacks are only getting nastier and smarter, which means DDoS attacks are also getting larger. In fact, the bandwidth for a recent attack topped 48 Gbps, an increase of more than 700% from the previous attacks. An attack of that size…

Learn More

Citrix Release Xen App and Xen Desk 7.6

Citrix today announced new releases of XenApp and XenDesktop, extending its market and technology leadership in application and desktop virtualization and in business-ready workspaces. XenApp and XenDesktop 7.6 deliver an unmatched user experience with instant app access, and virtually eliminate the costs of ensuring storage performance. The new releases set a new industry standard for…

Learn More

Supervalu Becomes Latest Victim of Hacker Attacks

Hackers may have gained access to customer data at over 200 Supervalu grocery stores in two dozen states. According to the company, hackers accessed a network that processes Supervalu transactions, with account numbers, expiration dates, card holder names and other personal customer information. Stores affected include 180 Supervalu stores and liquor stores run under the…

Learn More

How SMBs Can Protect Against Cyber Attacks

Small and mid-size businesses (SMBs) are an attractive target for hackers because SMBs represent a good return on investment. With less cyber security in place and minimal resources to dedicate to network security, hackers are finding plenty of valuable data to steal from unprotected SMBs. In fact, 30 percent of all businesses targeted by hackers…

Learn More

20 Critical Security Controls for Effective Cyber Defense

The Critical Controls for Effective Cyber Defense are a recommended set of best practices for cyber defense that provide specific and actionable ways to stop today’s most pervasive attacks. They were developed by a consortium of hundreds of security experts from across the public and private sectors. The Controls are derived from the most common…

Learn More

SIEM: Security for SMBs on a Budget

Protecting against cyber attacks is a never ending challenge, especially for SMBs. SMBs face the same cybersecurity issues as larger enterprises, but their smaller budgets make defending against hackers more of a challenge. SMBs don’t have the access to security experts and SMBs’ IT staff is busy focusing on mission-critical issues; therefore SMB are less…

Learn More

Get More Information

Use the form below to get more information about ACE IT Services and what we can do for you.

  • This field is for validation purposes and should be left unchanged.

Contact ACE IT Solutions for more details on our data storage, backup and disaster recovery solutions.

Call (646) 558-5575
Or Request More Information

  • This field is for validation purposes and should be left unchanged.