Proudly serving Virginia, Maryland and DC // Call us today! 703.396.6120
V2 SystemsV2 Systems
Cloud Transition in 2021 - Part 1

By Erik Briceno

Cloud Transition in 2021 – Part 1

Largely thanks to a remote work model in response to the pandemic, business and IT leaders all over the world are replacing legacy, on-premises technology with flexible, scalable and cost-effective computing power in the cloud. But remote work aside, there are many compelling reasons to migrate — from reducing IT costs to accelerating innovation. However, making the transition is not easy without a well-developed plan and cloud expertise. Fortunately, that’s where we come in.

In part one of our series on cloud transition, we take a look at why organizations are migrating to cloud platforms in 2021 — apart from and including the situation the pandemic has created.   Read more

Why It’s Time to Stop Using Single Factor Authentication

By Erik Briceno

Why It’s Time to Stop Using Single Factor Authentication

We’ve talked about the importance of multi-factor authentication (MFA) on our social media channels quite often. And now, in a recent bulletin put out by the Cybersecurity Infrastructure and Security Agency (CISA), they have made an official recommendation to businesses and organizations that single factor authentication (SFA) should no longer be used.

In light of this, we felt the importance of publishing a quick review on multi-factor authentication, or MFA, why it’s so essential, and what it entails.   Read more

Multi-Factor Authentication — Why It’s More Important Than Ever

By Erik Briceno

Multi-Factor Authentication — Why It’s More Important Than Ever

These days, everyone should know what MFA is. Multi-factor authentication (MFA) is something we’ve covered before as an important, basic step in cybersecurity hygiene. It’s so important in fact, that it’s even part of the Cybersecurity Maturity Model Certification (CMMC) framework.

For those of you who are still unfamiliar with MFA and/or how to implement it, here is a quick but important refresher.   Read more

Commonality of Data Breaches Increases: The Damage Is Worse Than You Think.

By Erik Briceno

Commonality of Data Breaches Increases: The Damage Is Worse Than You Think

In the new global remote work environment, never before have data breaches been more dangerous — or more commonplace. But do you fully understand why they’re dangerous?

Even setting aside the personal ways they affect everyone involved on an individual level — and even setting aside the fact that they could allow a nation-state threat actor to steal and commit espionage against U.S. government contractors — they have the potential to severely disrupt, if not outright destroy, organizations and enterprises of all sizes. In light of recent events, today’s article outlines the various ways data breaches can harm your company and why cybersecurity needs to be moved to the forefront of everything you do.   Read more

The U.S. Faces Two Distinct Threats When It Comes to Cyber Breaches

By Erik Briceno

The U.S. Faces Two Distinct Threats When It Comes to Cyber Breaches

According to former senior NSA official Glenn Gerstell: “There clearly is a dividing line between cyber hacks for intelligence gathering purposes, and these ransomware attacks that are designed principally for financial benefit.”

On one side of that line is the SolarWinds attack uncovered last December. The U.S. government says this was primarily an intelligence gathering operation carried out by Russia’s foreign intelligence service, the SVR, which was quietly stealing U.S. government secrets for months.

On the other side is ransomware, which is surging. Russian criminal gangs are blamed for both the Colonial Pipeline attack that hit gasoline supplies on the East Coast of the U.S. in May and an even more recent hack that briefly shut down the world’s largest meat supplier, JBS.   Read more

By Erik Briceno

Let Them Work From Home, But Don’t Leave Yourself Vulnerable

If you’re like many organizations right now, you’ve probably embraced a work-from-home policy. Even as things start slowly returning to normalcy, many organizations — and especially employees — are choosing to remain within a remote work or hybrid framework. But are you implementing it securely? Enabling workers to access the systems and data they need from home can create a wide range of cyber risks that attackers can be quick to exploit. Here are some of the most critical vulnerabilities that enterprises of all sizes need to watch out for.   Read more

Security Solutions for an Increasingly Dangerous Landscape

By Erik Briceno

Security Solutions for an Increasingly Dangerous Landscape

As technology progresses, so do the variety of threats to your IT environment and sensitive information. Rogue hackers, corporate saboteurs and vandals are a constant issue. New malware and ransomware are popping up every day. Government mandates and corporate requirements make security a top priority for conducting business today. The best protection comes from safeguards that are an integral part of your network infrastructure, software and management right from the start.   Read more

By Erik Briceno

Tired of being alarmed? Don’t become complacent.

In this year alone, ransomware attacks and data breaches are occurring at such frequency that it’s now become almost commonplace. When we hear it in the news, we simply shrug our shoulders and say, “Oh great, another one.”

The fact that it happens so often should not soften the severity of it. If anything, it should raise our state of alarm even higher. The problem is, we’ve become so fatigued by alarm. How do you remain vigilant despite this fatigue?   Read more

Incident Response Plans: Necessities for 2021 and Beyond

By Erik Briceno

Incident Response Plans: Necessities for 2021 and Beyond

You never want a cybersecurity incident to happen. But in today’s complex technological landscape, it does happen — frequently. Therefore, you need to be prepared to implement an incident response plan that will help your business reduce the risks, costs and recovery time associated with a security breach or cyberattack. Not doing so directly affects your company’s bottom line.

Small to midsize businesses can take steps to counter the ever-evolving threat of cyberattacks and become “cyber ready.” These steps are not overly complex or costly, and businesses can significantly protect themselves by taking action.   Read more

1 2 3 13
Cloud Transition in 2021 - Part 1
Cloud Transition in 2021 – Part 1
Why It’s Time to Stop Using Single Factor Authentication
Why It’s Time to Stop Using Single Factor Authentication
Multi-Factor Authentication — Why It’s More Important Than Ever
Multi-Factor Authentication — Why It’s More Important Than Ever
MSSP in a Post-COVID World
MSSP in a Post-COVID World
Commonality of Data Breaches Increases: The Damage Is Worse Than You Think.
Commonality of Data Breaches Increases: The Damage Is Worse Than You Think
The U.S. Faces Two Distinct Threats When It Comes to Cyber Breaches
The U.S. Faces Two Distinct Threats When It Comes to Cyber Breaches
Let Them Work From Home, But Don’t Leave Yourself Vulnerable
Security Solutions for an Increasingly Dangerous Landscape
Security Solutions for an Increasingly Dangerous Landscape
Tired of being alarmed? Don’t become complacent.
Incident Response Plans: Necessities for 2021 and Beyond
Incident Response Plans: Necessities for 2021 and Beyond