Business Continuity, Disaster Recovery, and Incident Response
In today’s economy, most organizations do business online and cannot tolerate any downtime. The organizations develop a Business Continuance Plan (BCP) and a Disaster Recovery Plan (DRP). An effective BC strategy ensures that …Read more
When paying the ransom is not an option
Yes, yet another article, post, or whatever reminding you about the criticality of taking ransomware very seriously. Not only is it a real threat that everyone is susceptible to, regardless of what you …Read more
Passwords – friends or foes?
Today we tackle the biggest quagmire known to mankind since its inception. No, I’m not talking about why Jimmy cracked corn, nor why we don’t care (we’re still investigating that one), I’m referring …Read more
Supply Chain Attacks Continue to Evolve
Unfortunately, supply chain and product constraint issues are nothing new in today’s technology industry. Hardware manufacturers and technology partners continue to fight a daily battle to promptly deliver products to their customer …Read more
Critical Remote Code Vulnerability with Apache Log4j
As many of you may be aware by this point, a critical remote code vulnerability was published concerning the Apache Log4j library on December 10, 2021. This vulnerability is being tracked by NIST …Read more
Defense in Depth
Defense-in-Depth. It’s time to revisit an old but tried and true model. Here at WTG we’ve been spending a fair amount of time investigating the landscape that is cyber liability insurance, cyber litigation, …Read more