Explore by Topic

ASMGi Becomes a Microsoft Authorized Education Partner

ASMGi earns distinction through a commitment to academic customers. ASMGi has achieved Microsoft Authorized Education Partner (AEP) status, demonstrating our ability to meet Microsoft academic customers’ evolving needs in today’s dynamic business...

read more

7 Malware Reports In 3 Days

Hackers are creating new forms of malware on a daily basis. In fact, 250,000 new malicious programs are registered by AV-Test every day. Large and small companies alike are at risk. Think of it this way. There is an army of mass-produced cyber weapons and...

read more

Corporate Cryptocurrency hush fund established

A rash of ransomware attacks demanding cryptocurrency bribe payoffs in order to regain access has some companies stockpiling the virtual currencies, hedging future ransom payments by investing in currency as its rising. The WannaCry ransomware attacks in...

read more

Which of Your Employees Could Expose your Organization?

The rise of spear phishing has allowed cybercriminals to customize their attacks to specific departments, teams, and employees within any organization. These cybercriminals know your company inside and out, they are looking to focus their attacks in order...

read more

Honored to achieve our fifth consecutive Weatherhead 100!

ASMGi has been recognized as one of Northeast Ohio’s fastest growing companies for the fifth year in a row. Case Western University’s Weatherhead School of Management describes the winners of the awards as an elite group of companies who are the best...

read more

CIO tips for non-CIOS

The role of the CIO is ever-changing. Sometimes new technology and information security is at the foot of a long to-do list behind duties that are rapidly shifting. Balancing the business, marketing, operations, finance on top of staying tech-savvy can be...

read more

Bounty Reward: Your Sanity

Finding holes in your IT security the same old way may only yield the same kinds of vulnerabilities. We’ve seen more and more companies deploying not only traditional internal and external pen testing, but challenging white-hat hackers to do their worst.

read more
Page 1 of 612345...Last »