Author Archives: Onsite Computing, Inc.

Tips on choosing a projector for your business

Projectors are essential tools for delivering impactful presentations. However, selecting the optimal projector for your business can be challenging due to the wide variety of models, features, and price points available. This guide outlines key factors to consider when making a purchase. This guide outlines key factors to consider when making a purchase, helping you […]

Belarusian-Ukrainian Hacker Extradited to U.S. for Ransomware and Cybercrime Charges

A coalition of law enforcement agencies coordinated by the U.K. National Crime Agency (NCA) has led to the arrest and extradition of a Belarussian and Ukrainian dual-national believed to be associated with Russian-speaking cybercrime groups. Maksim Silnikau (aka Maksym Silnikov), 38, went by the online monikers J.P. Morgan, xxx, and lansky. He was extradited to […]

How to Augment Your Password Security with EASM

Simply relying on traditional password security measures is no longer sufficient. When it comes to protecting your organization from credential-based attacks, it is essential to lock down the basics first. Securing your Active Directory should be a priority – it is like making sure a house has a locked front door before investing in a […]

DDoS Attacks Surge 46% in First Half of 2024, Gcore Report Reveals

Monitoring evolving DDoS trends is essential for anticipating threats and adapting defensive strategies. The comprehensive Gcore Radar Report for the first half of 2024 provides detailed insights into DDoS attack data, showcasing changes in attack patterns and the broader landscape of cyber threats. Here, we share a selection of findings from the full report. Key […]

Cybersecurity should return to reality and ditch the hype

As a chief information security officer (CISO), I’ve witnessed firsthand the transformation of cybersecurity from a niche IT function to a boardroom priority. Yet, despite its rise in prominence, this field is flooded with voices that often lack the depth and precision essential for true cybersecurity practice. At its core, cybersecurity is about safeguarding information […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.