Blog

Find here the articles and actionable information you need to simplify complex IT challenges.

The 5 ransomware recovery questions every CEO should be asking their
CIO/CISO today

What is the highest ranked concern of CEOs today?   Cyber attacks.  And it’s no wonder.  The truth is that most organizations are easily locked out of their systems for 21 days or more after a ransomware attack. Why does it take so long to get back online? That’s a question every CEO should ask their […] What is the highest ranked concern of CEOs today?   Cyber attacks.  And it’s no wonder.  The  … What is the highest ranked concern of CEOs today?   Cyber attacks.  And it’s no wonder.  The truth is that most organizations  … What is the highest ranked concern of CEOs today?   Cyber attacks.  And it’s no wonder.  The truth is that most organizations are  …
Person convincing an executive to buy Active Directory Backup and Recovery Solution

5 Ways to Win Executive Support for an Active Directory Backup and Recovery Solution

Chances are that your company’s executives don’t spend a lot of time thinking about Active Directory (AD). So, how can you convince them to invest in an Active Directory backup and recovery solution in case disaster strikes? It can be an uphill battle. That’s because of a belief that you can recover Active Directory simply […] Chances are that your company’s executives don’t spend a lot of time thinking about Active Directory (AD). So, how  … Chances are that your company’s executives don’t spend a lot of time thinking about Active Directory (AD). So, how can you convince them to  … Chances are that your company’s executives don’t spend a lot of time thinking about Active Directory (AD). So, how can you convince them to invest in an  …

Keeping Active Directory up and running all the time

As with any other service, the key to maintaining your Active Directory lies in proper management with a continuous improvement lifecycle; design, transition, operate. In this blog post, I will discuss the service life cycle as it applies to Active Directory to help keep your environment running smoothly and to rapidly address service impacts. As with any other service, the key to maintaining your Active Directory lies in proper management with a continuous  … As with any other service, the key to maintaining your Active Directory lies in proper management with a continuous improvement lifecycle;  … As with any other service, the key to maintaining your Active Directory lies in proper management with a continuous improvement lifecycle; design,  …
The image shows the consequence of not having an Active Directory Recovery Plan

12 Important Considerations for Active Directory Recovery Following a Ransomware Attack

Cyberattacks on organizations have skyrocketed in recent years, and the threat of a ransomware attack on Active Directory has become increasingly real and imminent. Most organizations have detailed plans in place to help them recover in the event of a cyberattack or other disaster, but the intricacies and complexities of Active Directory recovery are often […] Cyberattacks on organizations have skyrocketed in recent years, and the threat of a ransomware attack on Active  … Cyberattacks on organizations have skyrocketed in recent years, and the threat of a ransomware attack on Active Directory has become increasingly  … Cyberattacks on organizations have skyrocketed in recent years, and the threat of a ransomware attack on Active Directory has become increasingly real and  …
Effect of Active Directory Ransomware Attack

Active Directory Targeted Ransomware Attacks Are Skyrocketing: How to Mitigate Your Risks

Targeted Active Directory Ransomware attacks increased dramatically in the past years. Let’s take a look at how ransomware is affecting AD, what impacts can it have on your company and how you can manage risk. Plan B Sure, the title makes for dry reading, but it could just save you and your company a considerably […] Targeted Active Directory Ransomware attacks increased dramatically in the past years. Let’s take a look at how  … Targeted Active Directory Ransomware attacks increased dramatically in the past years. Let’s take a look at how ransomware is affecting AD, what  … Targeted Active Directory Ransomware attacks increased dramatically in the past years. Let’s take a look at how ransomware is affecting AD, what impacts  …
People elaborating a strong Active Directory Disaster Recovery Plan

Why Your Organization Needs a Strong Active Directory Disaster Recovery Plan

Remember the early days of Active Directory (AD), when no one connected it to the Internet? When antivirus software on your computers and servers was enough to protect the company? When your worst exposure to something going wrong in AD was a rogue admin deleting something or someone with too many permissions accidentally changing a […] Remember the early days of Active Directory (AD), when no one connected it to the Internet? When antivirus software  … Remember the early days of Active Directory (AD), when no one connected it to the Internet? When antivirus software on your computers and servers  … Remember the early days of Active Directory (AD), when no one connected it to the Internet? When antivirus software on your computers and servers was  …
Employee logs in from a backup Active Directory

Are You Overlooking This Critical Element in Your Cybersecurity Strategy?

Over 90 percent of companies use Active Directory (AD); however, most don’t have a tested AD disaster recovery plan in place to recover it after a cyberattack. Active Directory is used to manage access to network resources. Basically, it holds the keys to the kingdom so AD needs to be running all the time. why […] Over 90 percent of companies use Active Directory (AD); however, most don’t have a tested AD disaster recovery plan  … Over 90 percent of companies use Active Directory (AD); however, most don’t have a tested AD disaster recovery plan in place to recover it after  … Over 90 percent of companies use Active Directory (AD); however, most don’t have a tested AD disaster recovery plan in place to recover it after a  …

Threats & Risks of the New Normal (webinar)

On June 10th, Itergy, along with Quest Software, hosted an interactive webinar discussing the reality of IT threats and risks to organisations as people try to work during the pandemic, and prepare for the changes moving forward.  The link to the recorded webinar is here.  The pandemic took us all by surprise. Companies rushed to deploy solutions to enable employees to work remotely, often without securing them.   […] On June 10th, Itergy, along with Quest Software, hosted an interactive webinar discussing the reality of IT threats  … On June 10th, Itergy, along with Quest Software, hosted an interactive webinar discussing the reality of IT threats and risks  … On June 10th, Itergy, along with Quest Software, hosted an interactive webinar discussing the reality of IT threats and risks to organisations as people  …

Strengthen your remote working defences against cyber-attacks

A quick search of Google news reveals that there has been a dramatic increase in cyber-attacks due to Coronavirus.1 Even the World Health Organization (WHO) has seen attacks rise by 100%2, and hospitals and research centres have been victims of ransomware3. With the majority of office-workers now accessing systems remotely, the risks for companies of […] A quick search of Google news reveals that there has been a dramatic increase in cyber-attacks due to Coronavirus.1  … A quick search of Google news reveals that there has been a dramatic increase in cyber-attacks due to Coronavirus.1 Even the World Health  … A quick search of Google news reveals that there has been a dramatic increase in cyber-attacks due to Coronavirus.1 Even the World Health Organization  …