Why Secure Your IoT Data With a Zero-Trust Strategy?

If you’ve felt like new reports of data hacks and security breaches are becoming more common, it’s not your imagination. In fact, many organizations have begun adopting zero-trust IoT security strategies to protect their IoT data from potential breaches. The recent influx of supply chain attacks and cyberattacks via Internet of Things (IoT) technology has [...]

Recovering From a Ransomware Attack Seen Through 1 Interesting Analogy

As a solutions architect, the most important advice I give to my clients when designing new ransomware protection and recovery solutions is “Transform your data into a couch!” The couch ransomware analogy To understand what I mean by this seemingly silly statement, consider the following scenario: One day, you answer a phone call from a [...]

Sirius Case Study: A Recovery That Began Before a RobinHood Ransomware Attack

The odyssey began with a panicked phone call. A Sirius enterprise client had just experienced complete data loss. The RobinHood ransomware virus infected every Windows instance in his environment. All Windows infrastructure data was impacted, including data for web servers, accounting, claims, payroll, human resources and more. The Sirius solution architect—who designed and implemented the [...]

Secure Your IoT Data With a Zero-Trust Strategy

If you’ve felt like new reports of data hacks and security breaches are becoming more common, it’s not your imagination. The rise of the Internet of Things (IoT) as one of the fastest-growing device categories today means that securing your IoT data is more important—and difficult—than ever. By some estimates, as many as 300 billion [...]

Go to Top