How DiamondIT is supporting clients during the COVID-19 (coronavirus)

The Worst Cyber Attacks in History (So Far) and What We Can Learn

In 2017, the world experienced some of the largest and most dangerous cyber attacks in recent history.

The numbers are staggering: 

  • 143,000 million: the number of consumers affected by Equifax breach.
  • 3 billion: the number of people whose Yahoo email accounts were reportedly compromised. While the Yahoo! breaches occurred in 2013 and 2014, Yahoo! only disclosed the 3 billion number in October of 2017.

Shadow IT and Shadow Data: How Organizations Can Protect Against the Use of Unsanctioned Applications

When we think of cybercrimes we often think of criminals hacking into a network to retrieve sensitive corporate information.  But cyberattacks and the leaking of information can also occur from within an organization in the form of Shadow IT and Shadow Data.

DDoS Attacks on Schools – Why Schools are an Easy Target for Cyber Crime

Recently, DDoS or “distributed denial of service” attacks have been launched against schools, preventing faculty and students from accessing important educational materials online.

DDoS attacks have long targeted industries like finance and banking where cybercriminals can gain access to important financial data. But now, even non-profit organizations such as healthcare and educational institutions are being victimized.

According to one report, by THE Journal, education is now the most targeted sector for malicious attacks beating out healthcare.

Part Two – IT Saves Lives: Three Steps to A Successful Disaster Recovery Drill

Do you have a data disaster recovery (DR) plan?

Have you conducted a disaster recovery drill to make sure your DR plan is effective?

Whether it is a natural disaster that shuts down all the power and your computer systems with it, or even a cybercrime such as ransomware that can lock you out of your hard drive and computer files, being prepared for the inevitable emergency or crisis is of paramount importance.

Disaster Recovery Plans and Drills Help Restore IT Systems in Times of Emergency: Part One

Do you have a data disaster recovery (DR) plan?

Have you conducted a disaster recovery drill to make sure your DR plan is effective?

Whether it’s sophisticated cybercrime, such as ransomware attempting to steal data, or natural disasters that halt emergency management systems – it’s more urgent than ever for municipalities to protect their IT infrastructures and data.