Blog

What is the Motivation Behind Ransomware?

What is the motivation behind ransomware? Is the motivation behind these faceless attacks simply greed?  Talos Intelligence Group interviewed a hacker referred to as “Aleks”, a university-educated Russian male who says he taught himself cybersecurity skills to find new vulnerabilities and gain recognition. Aleks said that he started with legitimate cyber testing and would warn companies when […]

What is the Motivation Behind Ransomware? Read More »

Best Password Practices

Poor quality passwords and lax password rules within organizations are huge threats to cyber security. It’s important that as a business owner, you understand how strong passwords can be created, and why they are effective. It’s alarming that, we still see “password”, “abc123” and “123456” listed in a number of common password surveys. These passwords

Best Password Practices Read More »

Congratulations to our 2020 3rd Quarter Core Values Recognition Award Winners!

At Stratix Systems, we value our employees and appreciate all their hard work and dedication. Each quarter, we recognize members of our team who are nominated by their peers for living out our Core Values – Responsiveness, Consistency, Integrity, Environment, Continual Improvement and Community Focus. Please join me in congratulating our 2020 3rd Quarter Core

Congratulations to our 2020 3rd Quarter Core Values Recognition Award Winners! Read More »

Telecommuting – The New Normal?

With COVID-19 still running rampant throughout the country, many businesses have allowed (or been forced to allow) their employees to telecommute. Eventually the day will come when the threat from COVID-19 will decrease, and wide-scale telecommuting will no longer be necessary from a public health standpoint. With employees getting comfortable working in their loungewear, companies

Telecommuting – The New Normal? Read More »

6 Alarming Trends in Health IT

The COVID-19 pandemic hurried many trends in healthcare, including telehealth and data analytics. However, the pandemic has also exposed areas of weakness. There are some concerns developing about how the industry will evolve amid the pandemic and for years to come. Here are 6 concerns and important considerations. Hospitals’ inability to gather and report real-time

6 Alarming Trends in Health IT Read More »

A Third Party Claims You Have Been Breached – Now What?

Organizations tend to overlook breach notifications because of a loophole in virtually all privacy regulations. They do not address third party notifications, so companies feel free to ignore them. Whether deliberate or a casualty of the notification overload issue, ignoring third party notifications of data breaches is a huge problem for the breached company. The

A Third Party Claims You Have Been Breached – Now What? Read More »

Scroll to Top