<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2019184968353592&amp;ev=PageView&amp;noscript=1">

IT Solutions Blog

Solve the Problem of Cyber Asset Attack Surface Management

Posted by Solutions II

Solutions II, an award-winning Solution Provider specializing in Security, IT Managed Services, Hybrid Cloud, Data Management, Infrastructure, and Hybrid Maintenance solutions, is launching ASM (Attack Surface Management) Illuminate as a next-level service to protect your organization from a cyberattack.

Read More

Cyber Threats and Public Safety: Why Ransomware Can Be a Matter of Life or Death

Posted by Jason Norred

While businesses regularly deal with the operational disruptions and financial ramifications of cyber-attacks, it’s a different situation in the public sector, where state and local agencies hit by ransomware can quickly transform into a matter of public and personal safety.  

Read More

CIS Controls and Ransomware

Posted by Solutions II

I “wannacry” (couldn’t help it) when I think about the proliferation of the recent ransomware attack that affected over 200,000 systems in over 100 countries. Ruthlessly, this malware brought down rail and hospital systems alike. This is where it gets “real” and forces organizations of any size to evaluate their ability to mitigate such invasive and life-threatening attacks.

Read More

Ransomware Attacks in Perspective and How to Defend Your Data Against Them

Posted by Solutions II

As the impact from this weekend's WannaCry global ransomware attack continues to spread hour by hour, let’s take a moment to put the attack into context and discuss key methods to protecting your data against such attacks.

Read More