5 Reasons Why IT Operations Will Cost More in 2022

This coming year is unlike any other when it comes to IT budgeting. Not that any two years are identical, but IT budgets for 2022 will look decidedly different because of the pandemic. COVID-19 forced companies to change the way they do business and they used technology to do it. The rush to work from …

Read more

How To Stay In Compliance When Employees Work From Home — or From Anywhere

Your employees need to stay in compliance regardless of where they’re working. When employees Work From Home (WFH) or Work From Anywhere (WFA), the risk to your systems increases — breaches, malware, ransomware, device and network access, social engineering, the temptation to use workarounds, and other threats are more likely when people work away from …

Read more

The Kaseya Ransomware Attack, the Supply-Chain Threat, and What You Can Do

There has been a lot of news and some speculation about the ransomware attack on the Kaseya VSA software.  Here’s what’s happened so far. Cybercriminals exploited several vulnerabilities on Kaseya’s VSA on-premises product to attempt to install ransomware onto computers and servers managed by the Kaseya VSA. IT departments and MSPs use the VSA software …

Read more

How To Qualify for Cyber Insurance As Claims Skyrocket

More risk means tighter qualifications and higher premiums when it comes to insurance — cyber insurance is no different. The past few years have seen enormous increases in cybercrime and, not surprisingly, skyrocketing claims. “Policyholders can expect 20% to 50% rate increases for cyber coverage throughout 2021 as trends that began last year continue at …

Read more

Is Your Organization Ransomware-Ready?

(Updated) Ransomware is a gold mine for cybercriminals. It’s available on the dark web as-a-service, most businesses aren’t fully prepared to defend against it, and it can be monetized beyond the ransom demand by selling stolen data and using “name and shame” schemes. It’s no wonder we’re seeing an enormous spike — criminals are making …

Read more

The 2 Most Important Actions To Take After The SolarWinds Hack

We posed a series of questions to Leapfrog Services CTO Emmett Hawkins about what companies should do to improve their security posture after the SolarWinds hack. To recap what happened, late in 2020, a leading cybersecurity company named FireEye discovered it had been hacked and identified SolarWinds network-monitoring software as the source of the hack. …

Read more

Third-party Vendors Risk: 6 Steps To Protect Your Business

(UPDATED) One of the most important things we’ve learned from the SolarWinds hack is organizations need to include all software and apps in their inventories of third-party vendors. Historically, third-party vendors have been a primary risk when it comes to data breaches — they’re often the weakest link in the chain of protection. Third-party vendors …

Read more

IT in the New Normal: Q&A for Moving Forward

We posed a series of questions to Leapfrog Services CTO Emmett Hawkins about the IT changes he’s seeing during COVID-19 and asked what he recommends moving forward. His insights cover everything from how to think about IT differently to how to tackle transformative IT projects. Q: What are the biggest changes you’re seeing in the …

Read more

Change Management When Pivoting to Digital

Many of the things your team typically did at your location or in person now need to be done online. Doing business at a distance is part of the new normal. While it’s natural to be apprehensive about making changes to your IT environment, change is easier when you follow a proven plan and partner …

Read more

How Can We Help?
close slider
Send this to a friend