Across the country more than 140 municipalities, police departments and hospitals have fallen victim to ransomware attacks so far this year. Texas, where 22 public institutions have been infected by malware and held hostage, has been far from immune. In this case study review, we share how the Defense in Depth network security solution we […]
VersaTrust Blog
VersaTrust has been serving the Texas area since 1997 , providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.
The spate of cyberattacks on Texas cities has left municipalities wondering what can be done. VersaTrust’s owner and CISSP, Danny Owens, dissected the threat and outlined steps municipalities can take to combat the methods cybercriminals use in the interview below. 1. Is this the last we’ve seen of attacks on city governments? Danny Owens (DO): No. City […]
If you were shopping for a home security system, you wouldn’t settle for an option that only protects the front door. You’d want a system that can secure every nook and cranny of your house, 24/7. You need to have the same mindset when it comes to your business. You need more than firewalls and […]
building a home, you lay the electrical wiring before installing and painting the drywall. Going in reverse order is illogical and would create unnecessary complications. Similarly, when growing your business, you want to have processes in place that prevent extra work and mitigate risk, especially when it comes to IT. With a blueprint it’s much […]
is a lot like airbags and seat belts. They used to be optional but nowadays you probably wouldn’t drive a car without them. So, if a seat belt is an essential everyday safety measure, what about when you’re in a hurry and distracted? The same is true of network security and your business. It’s important […]
In the early days of information technology, network security was a fancy way of saying that you had installed antivirus software on your PC. Today the threats are more sophisticated, encompassing ransomware, identity theft and phishing attacks. Your network security must evolve in scope and sophistication just to continue doing business as usual. There’s a […]