<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2019184968353592&amp;ev=PageView&amp;noscript=1">

IT Solutions Blog

The Dark Side of Digital Mourning: The AI-Generated Web of Deception

Posted by Solutions II

The digital landscape, with its potential for connection and remembrance, has a lurking shadow side. Cybercriminals have been exploiting online memorials by creating false obituary websites. This happens when a legitimate site has a really difficult to detect - counterfeit counterpart. 

Read More

The New Frontier: Security Threats | Solutions II Security Experts Weigh In

Posted by Solutions II
As we approach mid-year 2023, technology continues to advance at an unprecedented rate, bringing myriad opportunities for businesses and organizations to excel in their respective industries. However, such rapid advancements have also exposed us to a new set of challenges, one of which is cybersecurity.

Read More

CJIS Compliance & Audits in Public Safety

Posted by Jeff Robbins

Adhering to stringent cybersecurity standards is not only a good first-line defense against cyber-attacks, but it’s also a requirement for government agencies.

Read More

Solve the Problem of Cyber Asset Attack Surface Management

Posted by Solutions II

Solutions II, an award-winning Solution Provider specializing in Security, IT Managed Services, Hybrid Cloud, Data Management, Infrastructure, and Hybrid Maintenance solutions, is launching ASM (Attack Surface Management) Illuminate as a next-level service to protect your organization from a cyberattack.

Read More

Cyber Threats and Public Safety: Why Ransomware Can Be a Matter of Life or Death

Posted by Jason Norred

While businesses regularly deal with the operational disruptions and financial ramifications of cyber-attacks, it’s a different situation in the public sector, where state and local agencies hit by ransomware can quickly transform into a matter of public and personal safety.  

Read More

Five Takeaways from the Gartner IO Conference

Posted by John Wondolowski

After spending last week in Las Vegas at the Gartner Infrastructure Operations and Cloud Strategy Conference – here are our five takeaways for IT Leaders.

Read More

Attack Surface Management: Learning from a Real-world Cyber Attack

Posted by Jacob Haynes

In order to understand the magnitude of an organization's attack surface, let's walk through a real-life attack scenario and see how Attack Surface Management (ASM) could have protected the organization from getting hit with ransomware.

Read More

Social Media Vulnerability

Posted by Solutions II

As businesses embrace the digital information age and the diverse tool sets to engage with the community many have found these very tool sets can be a double edged sword with potentially devastating effects. Remember when HBO had sensitive information regarding one of its hottest shows Game of Thrones find its way onto Twitter?? Today businesses have to ensure that the channels with which they operate are as locked down as their data repositories are.

Read More

To Click or Not To Click

Posted by Solutions II

Cyber Security firms are innovating at a pace never seen before trying to keep with various attack vectors facing organizations and individuals alike. It’s no secret that cyber security is a lucrative area to be in, but what is really driving this huge market and will it ever slow down? The speed and sophistication of attacks that happen to corporate America are on the rise and businesses that once held the stance of “we’re not at risk of being hacked” are now admitting that it’s no longer a question of “if” but “when”. With these escalating concerns, businesses are forced to pay big bucks to security firms to help reduce their risk, or look into IT managed services. They are also spending more on remediation of existing deficiencies as evidenced by this statistic and article from Business Insider: Cybersecurity is a $81.7 billion market - and startups are raking in the dough

Read More

Security 101...Protect Your Digital Assets Because the Bad Guys are Winning!

Posted by Todd Bowling

I am often asked (being in the business if IT security and cybercrime intel & defense) what can I do to prevent from being "hacked or breached"? I bet I get this question at least every other day and try to answer it to the best of my ability knowing that none of the questions or my answers are the same; similar? Yes, but identical? No. I also don't claim to be the "EXPERT" because I have met some of the best and brightest in this industry that fight this type of scourge on our behalf every day, from the cybercrime professionals at the FBI to those fighting cyber terrorism across numerous government and private agencies. To my astonishment I am also regularly amazed at the sheer lack of knowledge most people have when it comes to talking/understanding this topic given we have been hearing about it for years now. I do however, find a genuine "thirst" for learning about cybercrime and all of its offshoots. Unfortunately, this topic is complex and always on the morph. It is not easily "5-minute rice" or "Cliff Notes" addressable. So, let me start by discussing the most common, and likely most relevant, areas to begin a learning curve.

Read More