What Businesses Can Learn from the Colonial Pipeline Ransomware Attack
Companies of all sizes and industries are at potential risk of a ransomware attack. Here are key takeaways from one of the most recent high-profile cyber attack.
Looking for resources regarding cloud, colocation, hosting, backup, and disaster recovery? Then start with the VPLS blog, where you’ll find published content from our team of industry and technical experts, free to read.
Companies of all sizes and industries are at potential risk of a ransomware attack. Here are key takeaways from one of the most recent high-profile cyber attack.
Read this article to discover how to identify cybersecurity gaps and fix them by updating your organization’s IT structure.
In this blog, you’ll learn how to navigate vendor lock-in and get your resources out of the cloud.
The FBI and CISA have released a joint cybersecurity advisory warning of threat actors exploiting a suite of known Fortinet FortiGate firewall vulnerabilities.
A SOC is the focal point of an organization’s security operations and network defense. But SOCs vary in maturity levels and capabilities. Try our online worksheet to discover the type of SOC your team needs.
When it comes to managed firewalls, there’s more to consider than just CapEx and OpEx. Here are three important questions your team needs to ask before you make the move.
Cybercriminals commonly hide threats inside of encrypted traffic in order to evade security controls. Here’s how your firewall can combat the blind spot created by SSL.
Learn about the different types of insider threats and identify behaviors that pose a risk to your organization.
One of the leading causes of security breaches in healthcare organizations is insider threat. Learn what causes insider data breaches and how to counter this threat.
Find out how your organization can mitigate risks and respond to the SolarWinds Hack in this guide from leading cybersecurity experts.
VPLS actively serves two-thirds of the world’s time zones, with our staff in Hawaii functioning as the bridge between the mainland US and Southeast Asia.
With work/learn-from-home growing, IT staff in education face unique challenges in securing connectivity for students and faculty in their homes. In this blog post, John Headley highlights two other special concerns for IT and cybersecurity in education and his recommendations.