Employees often get the blame for data leaks, whether accidental or malicious. There is growing evidence, however, that executives are being targeted for their valuable credentials. A hacker can do a lot of damage with high-level executive credentials, which provide greater access to proprietary data and financial information. And once the credentials are on the…Learn More
The National Counterintelligence and Security Center (NCSC) has launched a public awareness campaign aimed at improving the minimum level of information security practices in place at businesses. Branded as “Know the Risk, Raise Your Shield,” the NCSC has released a set of tools to help businesses develop a strategy to protect their data, assets, technology…Learn More
With a trick as simple as spearphishing, hackers were able to create massive chaos around the 2016 election. It all started with a standard-looking security request from Google for John Podesta, Hillary Clinton’s campaign chairman, to change his password. Two days later, Russian hackers stole — and later leaked — more than 50,000 of Podesta’s private…Learn More
Ransomware is the fastest growing malware threat, targeting users in all industries and businesses of all sizes. On average, more than 4,000 ransomware attacks have occurred daily since January 1, 2016. This is a 300-percent increase over the approximately 1,000 attacks per day seen in 2015. What is Ransomware? Ransomware is a form of malware that…Learn More
Contact ACE IT Solutions for more details on our data storage, backup and disaster recovery solutions.
Call (646) 558-5575
Or Request More Information