Call Us (860) 577-8060

Security Archives - Sound Computers | Westbrook, CT

blog-img

Watch Out For Ransomware In The Cloud!
Last year, the REvil cybercrime gang ruined the Independence Day Holiday for hundreds of American businesses after successfully launching a ransomware attack. The attack forced hundreds of companies to close temporarily. REvil demanded a ransom of $70 million to unlock their files.

This attack isnt a one-off. Ransomware is a growing threat to businesses across America. Research shows that cybercriminals launch roughly 4,000 ransomware attacks per day and that number is set to increase with the rise of ransomware-as-a-service. 

Read More
blog-img

The Top Social Engineering Tactics Cybercriminals Are Using Right Now

Social engineering refers to a broad spectrum of cyber attacks in which a malicious actor uses psychological manipulation to trick people into sharing sensitive details or clicking on a malicious link. 

Read More
blog-img

4 Top Mobile Device Attacks

The mobile workforce has come into its own over the last 18 months. After COVID-19 forced organizations to rethink their workplace operations, remote and mobile working quickly became a part of day-to-day business. It’s a trend that is set to skyrocket in the coming years. The International Data Corporation (IDC) believes that by 2024, 60% of the US workforce will be considered mobile workers. 

Read More
blog-img

RPO vs RTO: What's the Difference & Why Are Both Important To Know?


Every company needs to have a data backup and disaster recovery plan in place in this data-first world. Disaster recovery refers to a program used to regain access to data, systems and IT services after an unintended outage. Backup is often a critical part of the recovery process.

Read More
blog-img

Many small and medium-sized business owners (SMBs) think that supply chain attacks won't happen. While SMBs might not be the initial target of a supply chain attack, they can easily get caught up in the crossfire and become collateral damage.

Read More
blog-img

It seems like another cyber attack occurs or a new form of malware emerges every day. Cybersecurity Ventures expects global cybercrime costs to grow by 15% per year over the next five years and reach $10.5 trillion by 2025. This leads us to the need for cyber insurance.

Cyber insurance can help your business with recovery in the event of a cyber attack. It is important to note that it can’t prevent cyber incidents. However, it can help with financial recovery.

Read More
blog-img


It is a scary thought. The analyst firm Gartner 
predicts that a whopping 99% of cloud security breaches will be the customer’s fault by 2025. This means that cloud providers (like Amazon, Microsoft and Slack) are doing an excellent job at keeping their platforms secure but their clients (businesses across the globe) are failing. 

Read More
blog-img

Privileged account management (PAM) is a useful way for companies to ensure that users with excess access privileges are using their accounts appropriately and securely. PAM is also a valuable means to ensure that privileged accounts have not been compromised by external cyber-attackers.

Read More
blog-img


You might have heard of ransomware and malware but "Bossware" might be a new term for you. Don't panic. Bossware isn't a new type of cybercrime. It is actually a tool that your business can use to monitor employee productivity.

Read More
blog-img

One of the big findings in the Sophos 2021 Threat Report was that the lack of attention to basic cybersecurity best practices is at the heart of many of the most damaging attacks that companies saw last year. 

Read More