Recent Blogs

Salad Solutions: Cybersecurity Insights Over Lunch

Sometimes the simplest exercises yield the most profound insights. I recently found myself in a casual yet revealing tabletop exercise with Taylor, the owner of a technology firm, and their main technical expert, Jordan (names have been changed for anonymity). We were discussing the intricate steps malware would need to take to breach their backup infrastructure, essentially a lunchtime strategy session on securing their digital fortresses.

Read More

3 Steps to Cyber Recovery

No one wants to imagine an incident such as ransomware that devastates your infrastructure, yet nearly 50% of companies are impacted. According to Gartner, 60% that suffer permanent data loss will go out of business.

Read More