Deft CISO Thomas Johnson spoke to CyberNews about security, disaster recovery, hybrid cloud, and more. Here’s the summary.
There’s no single step you can take to fully protect your network. But there are basic network protection steps that you can implement now.
Ransomware threats and disaster events are more prevalent than ever. The only way to be prepared is to expect it.
Any participating organization has the opportunity to select the Trust Services Criteria that apply to them.
At Deft, we participate in all five.
A critical vulnerability has been made public for Apache’s Log4j Java-based logging tool. It allows an attacker to alter code remotely.
If you’re diligent about having up-to-date backups, recovering from ransomware is as easy as cutting off infected infrastructure and restoring your backups.