What is the different between data backup and disaster recovery? We get this question a lot from clients looking to find the balance between their budget requirements and making sure they can access their data and technology whenever they need it. Data Backup Data backup is a necessity. Non-optional. Every businesses must have it. Data backup…
Learn MoreCyber crime is a major threat to businesses, costing the global economy over a half a trillion a year according to insurer Allianz. Because criminal hackers are so proficient and because computer systems are so central to business, some analysts predict insurers could soon face catastrophic losses. Many businesses are looking to cyber security insurance to…
Learn MoreLast week, IBM Security reported on an active phishing campaign, named Dyre Wolf, that has successfully stolen more than $1 million at a time from targeted enterprise organizations. The heist uses advanced social engineering tactics geared to circumvent two-factor authentication to quickly penetrate targeted organizations and spread Trojans using their victims’ email contacts lists. Most banking Trojans target individuals, but Dyre…
Learn MoreIBM has released its X-Force Cyber Security Threat Intelligence Report (Q1 2015) and it discloses some very interesting facts about the cyber threat landscape over the last year. Based on pure volume, the total number of records breached in 2014 was nearly 25 percent higher than in 2013 The tone of breaches has shifted, revealing disturbing…
Learn MoreAccording to the New York Times hackers have successfully made away with millions of dollars in one of the largest bank hacks in history. The majority of the targets were in Russia, but banks in Japan, the United States and Europe were also targeted. The bank’s internal computers, used by employees who process daily transfers…
Learn MoreA proposed law would give businesses that have been hacked 30 days to fess up. The Personal Data Notification & Protection Act would give a company 30 days to notify customers that their personal information has been exposed. On average, the time from when a company is hacked to the time the hack is discovered…
Learn MoreBusiness leaders have much to learn from the recent cyber attack against Sony. One of the most important lessons: Have a plan for dealing with cyber attacks. The much publicized hack led Sony to shut down all computer systems, including those in overseas offices, leaving the company with no voice mail, no corporate email, no…
Learn MoreSony’s CEO is facing widespread scrutiny about his judgment in the wake of the cyber attack that has paralyzed the entertainment company and exposed it to embarrassment and untold millions in damage. Much of the criticism focuses on the CEO not taking steps to properly secure the company’s computer network. In fact, cyber security experts…
Learn MoreHome Depot announced on Thursday that hackers who stole 56 million customer credit and debit card accounts also made off with 53 million customer email addresses. Home Depot stressed that the files containing the stolen email addresses did not contain passwords, payment card information or other sensitive personal information. However, that will not stop cyber thieves from…
Learn MoreAccording to CNBC, cybercriminals acting in late 2013 installed a malicious computer program on the servers of a large hedge fund, crippling its high-speed trading strategy and sending information about its trades to unknown offsite computers. They attack was thwarted by a cyber intelligence firm BAE Systems Applied Intelligence, which declined to name the hedge fund…
Learn MoreGet More Information
Contact ACE IT Solutions for more details on our data storage, backup and disaster recovery solutions.
Call (646) 558-5575
Or Request More Information