Apple Releases Updates to Actively Exploited iOS and iPadOS Vulnerability

The vulnerability allows for arbitrary code execution at kernel level permissions and appears to be actively leveraged by threat actors. A software update should be performed ASAP. Darryl Cresswell CEO & President MYDWARE IT Solutions Inc.

The Secret History of Cybersecurity Awareness Month (And its Not-So-Secret Future)

Have you ever wondered where all those weird holidays come from? Like, who got to decide that April 23rd was National Talk Like Shakespeare Day? Or that Squirrel Appreciation Day would fall on January 21st? Or that the last Friday ...

Want To Make Sure Your Business Is Protected From A Data Disaster?

Did you know that 93% of all businesses – that don’t have a disaster recovery plan in place when they experience a data disaster – go out of business within a year of that disaster? And yet, 68% of businesses ...

Defense in Depth (DiD): Think Like a Hacker

The current threat landscape is rapidly advancing, with cybercriminals constantly upgrading their toolset to break through security defences. If you want to outsmart malicious hackers, it’s time to start thinking like them. Fend them off with various layered defence methods. ...

7 Elements of an Effective Defense in Depth (DiD) Security Strategy

DiD is a cybersecurity approach in which multiple defensive methods are layered to protect an organization. Since no individual security measure is guaranteed to endure every attack, combining several layers of security is more effective. Discover how layering security methods ...

Stepping Up Your Cybersecurity With Defense in Depth (DiD)

When the pandemic hit, businesses all over the globe had to shift to remote work almost overnight. Now, with the vaccine rollout in full swing, the hybrid work model is gaining popularity. This allows employees to work from home, the ...

Enhance Your SMB Backup Strategy With Data Deduplication

Download our eBook to learn how effective data deduplication policies save storage space and enable faster recovery after a data-loss incident. Deduplication Reduces Storage Requirements & Network Loads. Storage capacity for most SMBs is limited. However, the amount of data ...

A Flexible Partnership With IT Professionals

It’s hard to see how investing in your company’s IT services would be as incentivizing as other investments that might deliver a more tangible ROI. However, ensuring that your IT department has a competent team that’s up-to-date on the latest ...

4 Reasons Cybersecurity Attack Surfaces Are Expanding

The COVID-19 pandemic impacted individuals and businesses all over the world in one way or another. Almost overnight, it disrupted the way people went about their daily routines and how companies operated. Amidst all the chaos, changes to the cyber ...

Recovery Assurance (RA): Is Your Business Data 100% Recoverable?

Ever since the start of the COVID-19 pandemic, the concept of Disaster Recovery (DR) has received unprecedented attention. Most businesses have realized the importance of bouncing back quickly from a disruptive event. In 2020, about 80% of SMBs reported having ...