Manas Parthasarathy

Recent Posts

How to Protect Your Business from In-Session Phishing

Posted by Manas Parthasarathy on Jun 27, 2019 9:30:00 AM

If you take a look at the number of tabs open in your browser, you might realize that you have way more open than you’re actually using. Some might open automatically when you open a link, whereas others may be older tabs that you haven’t closed yet. Most of us don’t pay too much attention to our open tabs as we browse, and with the evolution of browsers, operating systems, and computer hardware, our computers become more capable of handling activities such as having a dozen web pages open simultaneously.

Read More

Topics: cybersecurity, phishing

Pharming: What it is and how to protect your business

Posted by Manas Parthasarathy on May 30, 2019 8:44:39 AM

Some cyberattacks can be fairly easy to notice. A phishing email might be identified by the sender address, formatting, or the address of a link, while vishing could be identified by someone asking prying questions over the phone. Some attacks, however, may be tougher to spot. There are a few types of these, one of the most notable being pharming.

Read More

Topics: cybersecurity, phishing, pharming

Smishing: How to protect yourself and your business from cybercrime

Posted by Manas Parthasarathy on May 28, 2019 7:30:00 AM

You’ve probably heard of phishing, the infamous practice by which a hacker may try to trick you into giving away sensitive information via email. However, there is much more to phishing than just a suspicious email here or there; as individuals and businesses become more savvy about threats like those that may come via email, cybercriminals expand their arsenal of tools to cost you precious time and money. One example of this is smishing.

Read More

Topics: cybersecurity, phishing, smishing

Vishing: What it is how to protect your business

Posted by Manas Parthasarathy on May 21, 2019 10:10:40 AM

Phishing is a widely known cybersecurity risk; you’ve probably heard of it. A cybercriminal sends a convincing email, complete with a link to what looks like a company’s website at first glance, only to attempt to obtain your login credentials for their own use. Over the past decade, consumers and businesses alike have been taking steps to protect themselves from this threat. What you may not know, however, is that there are various types of phishing attacks beyond those carried out exclusively over email. One such type is vishing.

Read More

Topics: cybersecurity, phishing, vishing

Data Breaches: How Much They Can Cost You

Posted by Manas Parthasarathy on May 14, 2019 7:30:00 AM

Imagine the following scenario. You’re sitting at a coffee shop, getting some work done. While you look away, someone comes by and steals your computer. You probably wouldn’t be too happy about this; that computer is worth a lot of money, and you need it to get important things done. Now what if you’re sitting at a coffee shop, getting some work done, and instead of stealing your computer, someone in the coffee shop is stealing information about what you’re doing? What could that data be worth?

Read More

Topics: Data Protection

How to Know If a Hybrid Cloud Is Right for Your Business

Posted by Manas Parthasarathy on May 2, 2019 7:30:00 AM

Cloud technology can be difficult to understand. Being fairly abstract in meaning, it’s easy to forget that there isn’t just one deployment that’s compatible with cloud computing. In fact, not every cloud computing solution is right for every type of company.

Read More

Topics: Hybrid Cloud, cloud migration

What You Need to Know About Preventing Data Breaches

Posted by Manas Parthasarathy on Apr 30, 2019 7:30:00 AM

High profile data leaks and security breaches have been commonplace in the past few years, with instances of high-profile breaches of large tech companies often making the news. However, it’s not just tech giants who are at risk of having their business’ or their customers’ data accessed by outside entities; small and medium-size organizations across all industries can be at risk as well. Recently, such an example manifested at Georgia Tech University, where an unauthorized user of a university web application exposed information like names, birth dates, and social security numbers for up to 1.3 million people. The implications of these leaks can range from an outside actor simply viewing the data to find anything of use, to using the information they extract to discover perceived weaknesses at your firm, or even demanding a ransom for disposing of the data.

Read More

Topics: SECaaS, Data Protection, cybersecurity

Disasters and Your Data: How to Prepare for This Year’s Hurricane Season

Posted by Manas Parthasarathy on Apr 23, 2019 8:00:00 AM

The 2019 Atlantic hurricane season is quickly approaching, beginning on June 1st and lasting through the end of November. AccuWeather predicts up to 14 tropical storms, of which seven storms could have the potential to develop to hurricane strength. The devastation from these storms is staggering; storms such as Hurricane Sandy in the Northeast, Hurricane Maria in Puerto Rico and the Caribbean, and Hurricane Harvey in the Southeast and Gulf regions have caused over $260 billion worth of damage between them within the past ten years.

Read More

Topics: Disaster Recovery, Disaster Recovery Plan, BDR, Data Protection, Hurricane Preparedness

Subscribe to our Blog!

DR Guidebook CTA

Recent Posts

Posts by Tag

See all