Insights from VAF Blog

What Business Leaders Should Know About Ransomware

May 20th, 2022 by Van Ausdall & Farrar

Ransomware is one of the most damaging cyber-attack types of all time. It’s the one feared the most by business owners and cybersecurity defenders. This worry is not without reason. In an instant, an organization’s critical IT infrastructure can be...

Read Full Story »

Posted in: Insights from VAF Blog, Data Security & Compliance Solutions, Cybersecurity

5 Important Ways to Improve Your Cybersecurity

April 19th, 2022 by Van Ausdall & Farrar

$3.9 Million. That’s the answer to the following question… What was the average total cost of a single data breach in 2020? Cybersecurity is expensive, but the alternative is more than many companies can pay. I won’t take any more of your time...

Read Full Story »

Posted in: Insights from VAF Blog, Cybersecurity

How to Keep Your Business' Data Safe and Secure

November 3rd, 2021 by Van Ausdall & Farrar

Data breaches, especially for small- to midsize companies, continue to be a major threat, as cybercriminals have become more sophisticated in their methods. Most data attacks come out of nowhere and often target companies with sub-par security solutions...

Read Full Story »

Posted in: Insights from VAF Blog, Data Security & Compliance Solutions, Cybersecurity

Steps to Effective Mobile Device Security in 2019

October 22nd, 2019 by Ashlee Colliver

If you’re in charge of corporate IT, you know computers can be tricky to keep secure. When you add in the factor of portability – like when a mobile device is checked out of the office – your challenge grows exponentially. ESSENTIAL LAYERS OF MOBILE DEVICE...

Read Full Story »

Posted in: Insights from VAF Blog, Data Security & Compliance Solutions, Information, Managed IT Solutions

Understanding the Meltdown and Spectre Vulnerabilities

January 15th, 2018 by Guillermo Fernandez

As of the date of this post, some manufacturers have recalled updates.  This situation will continue to change.­ This post covers the following: What the Meltdown and Spectre exploits are Who is affected How to avoid problems What are Meltdown...

Read Full Story »

Posted in: Data Security & Compliance Solutions, Cybersecurity