By Eric Corcoran, Posted in Technology Week in Review

Monday 8/16 Breaking Down STEM Perception Barriers and Tackling a Career in Cybersecurity (Fortinet) Fortinet profiles two women in cybersecurity, cybersecurity career interns Taylor Leslie and Claire Smerdon, who speak about what interested them about a STEM career in cybersecurity, what obstacles they have faced, and what they think we can do to help break down perception barriers. What to Do After Responding to a Phishing Email (Proofpoint) Phishing emails can target anyone wi... read more.

  • August 23, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/9 Extortion Payments Hit New Records as Ransomware Crisis Intensifies (Palo Alto Networks) The ransomware crisis continues to intensify as criminal enterprises boost investment in highly profitable ransomware operations. CISA Launches New Joint Cyber Defense Collaborative CISA is establishing the JCDC to integrate unique cyber capabilities across multiple federal agencies, many state and local governments, and countless private sector entities to achieve shared objective... read more.

  • August 13, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/19 Respond to Business Challenges with Agile Storage (Pure Storage) Unexpected events are inevitable. With agile data storage, you can stay modern while responding to your business needs in an economical way. Check Point Software showcases new offerings, integrations, and tools at Microsoft Inspire 2021 The decades-long partnership between Microsoft and Check Point Software Technologies is not only a strong building block for our companies, it’s also a great tool f... read more.

  • August 06, 2021

By Ed Bratter, Posted in Infrastructure, Security

One of the benefits of Microsoft 365 is the ability for users to collaborate and share with co-workers, clients, vendors, partners, and people external to the organization. This benefit, however, comes with a downside; users can either purposely or inadvertently expose information that the organization would not want shared externally.   To complicate matters, newly established tenants leave the door wide-open for publishing data to external entities. As a result, users can share data with outside ind... read more.

  • July 27, 2021

By Ken Phelan, Posted in Uncategorized

As many of us return to work and the world feels like it’s returning to normal, it can be easy to forget that the COVID-19 pandemic isn’t completely behind us. Cases are surging in parts of the country, and for a growing number of people, their initial case of COVID was just the beginning of an ongoing ordeal known as long COVID, post-COVID, or long-haul COVID. This terrible affliction has stricken one of the Gotham family and we are rallying around Jason. Jason is Fara Smith’s twin broth... read more.

  • July 26, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 7/12 What’s new with Citrix Workspace — June 2021 We continue to make the employee experience better and more productive for workers and the IT management process more automated, seamless and intuitive for the  IT teams that manage digital infrastructure. With each month that goes by, we find new ways to bring innovations to market to reach those goals. QLC: Yes, It’s Real and People Want It (Pure Storage) Not only are we eliminating the need for hyb... read more.

  • July 16, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/28 Make Internet Access Safe - Adopt Zero Trust Network Security! (Palo Alto Networks) As applications move to the cloud and users work from anywhere, securing internet access has moved to the forefront in the battle against cybercriminals. 5 White House Recommendations for Modern Data Protection Against Ransomware (Pure Storage) In response to these increasing cyber threats, the White House recently raised ransomware to the top of the national security agenda, issuing a... read more.

  • July 09, 2021

By Timothy Karl, Posted in Infrastructure, Security

With anti-malware scanning software it is very important to have the proper malware exclusions in place. A misconfiguration of these settings may lead to performance issues which can may cause outages of critical applications and services due to file contention and locking. IT administrators need to find a balance between a malware-free environment and affecting the reliability and performance of any applications or services. Anti-malware exclusions can come from a variety of sources. Each anti-malwar... read more.

  • July 02, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 6/21 Getting on Target: Attacker’s Perspective of your Attack Surface Join Randori and Gotham for a virtual lunch on June 23rd at 12PM Famous hacker, Aaron Portnoy (featured on the cover of Time magazine), will break down how hacker’s prioritize vulnerabilities on your attack surface. Attendees will receive a $25 Uber Eats gift card, and the opportunity to get a free hacker assessment of your perimeter that includes a custom ShadowIT report. Our... read more.

  • June 25, 2021

By Michael Hawkins, Posted in Security

This is part two of our two-part Ransomware Readiness series. Click here to read part one. Ransomware has recently had several high profile cases, including attacks on Fujifilm, JBS, and the Colonial Pipeline. These attacks continue to highlight the importance of the security controls that help to stave off or limit the damage. Gotham Technology Group has developed a ransomware remediation assessment service that analyzes your current technology state and staff training while making recommendati... read more.

  • June 23, 2021