https://www.i3info.com/wp-content/uploads/2021/06/ransomware_2-1280x640.jpg

This is part of a series of blogs intended to both inform and provide potential solutions and resources to protect organizations of all sizes and industries from the perils of being a “connected” entity. In this follow-up, I explain the source and nature of the most recent and, potentially, most financially devastating of cyberattacks:  Ransomware.

https://www.i3info.com/wp-content/uploads/2021/03/cyber-security-assessment-1280x640.jpg

This is a follow-up to my previous blog title, The Importance of Cybersecurity Compliance. In that article, I explain why organizations of all types and sizes should embrace good cybersecurity practices to protect their organization’s people and information assets. I also outlined three of the many cybersecurity compliance frameworks that provide best practice guidance in achieving good cyber-health (ISO, NIST, and CMMC).