Letson Jackson

cyber security myths

Common Misconceptions About Cybersecurity

1) High-end security tools are enough to keep you safe. Sophisticated cybersecurity solutions are certainly an essential part of keeping your business secure, but they don’t solve every problem. As the story in this book’s introduction illustrates, regardless of how solid defenses are, there are always gaps and vulnerabilities. It’s important that security tools don’t …

Common Misconceptions About Cybersecurity Read More »

cyber defense company

Widespread Post-COVID Changes in IT

Even as the country recovers from a pandemic response posture, we’re seeing some changes to the business world crystalize and cut a more permanent groove into the IT landscape: Institutionalized remote working. Greater use of online collaboration and communication tools. Accelerated migration to the cloud in both infrastructure and applications. A sharp rise in e-commerce. …

Widespread Post-COVID Changes in IT Read More »

noftek covid cyber security

Cybersecurity in a Post-COVID World

The pandemic’s effects on health, businesses, and infrastructure led to disaster for many. Entire societies were affected as deaths and response policies combined to completely change the very idea of day-to-day living. Many individuals felt the loss of loved ones, while many others lost their employment or businesses.  Through all of this, while most legitimate …

Cybersecurity in a Post-COVID World Read More »

ransomware-data-vaccination

The Three Requirements of Ransomware Defense (They’re Not What You Think)

Everyone loves an all-in-one solution, especially when it comes to technology. With business networking and IT so complex to begin with, it’s never a bad idea to keep things simple whenever possible. In reality, there are some cases where all-in-one solutions simply don’t work, or they don’t even exist. Part of the complexity of IT …

The Three Requirements of Ransomware Defense (They’re Not What You Think) Read More »

kaseya hack 2021

July 2021 Kaseya Hack: Ransomware, REvil, and Insider Threats

The weekend of Independence Day turned to chaos for several IT companies when they were struck by what’s being called the largest ransomware attack on record. A handful of small managed service providers, along with one of the largest IT vendors in operation, Kaseya, stood at ground zero of the attack. The IT providers’ clients …

July 2021 Kaseya Hack: Ransomware, REvil, and Insider Threats Read More »

government data leaks

Government Data Leaks – How to Prevent Your Organization from Becoming a Data Breach Target

Is your government organization at risk of a data hack? More and more, that answer would be yes. Today, it’s all too common for hackers and other nefarious characters to target government agencies specifically, leaking data that can be sold or ransomed, sometimes for political gain. How can you prevent your Caribbean-based government organization from …

Government Data Leaks – How to Prevent Your Organization from Becoming a Data Breach Target Read More »

blue data leaks

Blue Leaks and Other Data Threats – Is Your Trinidad & Tobago Police Department at Risk? How to Protect Yourself

You didn’t think a data security breach could happen to your Trinidad & Tobago police department until your proprietary data got into the wrong hands. Your law enforcement agency is far from alone. Police data leaks are becoming more common all the time. What can you do about it? Caribbean island law enforcement should prioritize …

Blue Leaks and Other Data Threats – Is Your Trinidad & Tobago Police Department at Risk? How to Protect Yourself Read More »