Cybersecurity experts are still investigating the Colonial Pipeline hack. It’s likely that a compromised password allowed the attackers into the affected network. There are several ways this could have happened: a successful phishing attempt, poor password management, un-patched systems. Regardless, Colonial Pipeline ended up paying roughly $5 million in ransom to the hacking group DarkSide…Learn More
As we have seen with all the recent high-profile ransomware attacks, cybercriminals work around the clock to detect and exploit vulnerabilities in your business’ network for nefarious gains. The only way to counter these hackers is by deploying a robust cybersecurity posture that’s built using comprehensive security solutions. However, while you’re caught up doing this,…Learn More
In the wake of the Colonial Pipeline ransomware attack, we’ve decided it is a good time to revisit creating a solid cybersecurity strategy for your business. We see high-profile hacks as a learning opportunity. This is a good time to assess your cybersecurity strategy and see what you could be doing better. On Friday, May…Learn More
Phishing is has been the number one attack vector for over five years. Hacking your “human cyber shield” It is the primary way that bad actors gain access to your systems and it is important that all your employees — and anyone else who has access to your network and data — knows how to…Learn More
Contact ACE IT Solutions for more details on our data storage, backup and disaster recovery solutions.
Call (646) 558-5575
Or Request More Information