Wolf TG Blog | Business IT Insights

Top Tech Trends for 2019

Posted by Angel Martinez on Jan 29, 2019 11:36:00 AM

Technology boomed in 2018 both on the Dow Jones and in its impact on American businesses and consumers. So far, 2019 looks like it will continue that same fast-paced growth in the tech sector. While some long-time technology companies such as Apple and Facebook are showing a bit of wear and tear due to concerns over data privacy and management, overall the sector is the picture of health.


Here's what we see as the top tech trends for 2019.

Read More

Topics: IT News & Updates, Cybersecurity

Google Assistant, Facebook Data, and the GDPR

Posted by Angel Martinez on May 17, 2018 4:41:36 PM

This Week in Technology

Google Assistant Gets 6 New Voices!

Last week Google announced they are adding some new voices to their Google Assistant enabled devices. If you're looking for fresh sounds from your Google Home, Android phone or tablet (with Android Marshmallow or later), or your Chromebook, you're in luck! You now have access to 6 distinct voices: 3 male and 3 female.

These new voices are already live and ready to be used by your Google devices. Click the link below for a walk-through of setting up your brand new voice!

Here's How to Set up These New Voices on Your Device

Read More

Topics: IT News & Updates, Tips and Tricks

Examining The Impact Of Next Gen Ransomware

Posted by Gregory Wolf on Dec 14, 2016 8:00:00 AM

One of the biggest emerging threats for businesses is ransomware. In 2015, research analysts found that ransomware has netted over $300M in profits for the cyber gangs affiliated with these attacks. Motivated by these profits, network security experts predict that the next generation of ransomware could cause significant problems for businesses and consumers alike.

Read More

Topics: Ransomware, IT News & Updates

6 Ways To Get The Most Out of Windows 10 In The Enterprise

Posted by Gregory Wolf on Oct 11, 2016 8:00:00 AM

Organizations have recently begun deploying the popular Microsoft Windows 10 operating system to desktops, laptops and mobile devices.

Now that Windows 10 has been installed on hundreds of millions of devices worldwide, both administrators and end users must learn how to get the most out of their new Windows 10 operating systems.

Here are 6 ways that you can get the most out of Windows 10:

Read More

Topics: Safety & Security, IT News & Updates

7 Best Practices for Preventing Ransomware on Your Network

Posted by Gregory Wolf on Jul 19, 2016 8:00:00 AM

With the growing popularity of ransomware cyber attacks, we thought we'd spend the next few weeks covering the topic so you can better understand what ransomware attacks are, who's behind them, how to protect against them, and what to do if you become a victim of such an attack. This is post 6 of 6.

Ransomware attacks have generated hundreds of millions in profits for cyber criminals. Ransomware has emerged as one of the top threats for businesses as an infection can potentially put your entire organization in disaster recovery mode.

How can you keep your organization protected from these malicious attacks? In this guide, we will examine some of the best practices involved with preventing ransomware on your network.

Read More

Topics: Safety & Security, Ransomware, IT News & Updates, Best Practices

Who's Behind the Recent String of High Profile Ransomware Attacks?

Posted by Gregory Wolf on Jul 12, 2016 8:00:00 AM

With the growing popularity of ransomware cyber attacks, we thought we'd spend the next few weeks covering the topic so you can better understand what ransomware attacks are, who's behind them, how to protect against them, and what to do if you become a victim of such an attack. This is post 5 of 6.

Ransomware has emerged as one of the top cyber security threats of 2016. If your business is hit with a ransomware infection, the consequences could prove to be devastating.

Did you know that ransomware has made international headlines for bringing critical infrastructure to a grinding halt? In early 2016, Hollywood Presbyterian Medical Center was hit with a ransomware infection that demanded a payment of $17,000 in order to regain access to the hospital's files.

Another notable high profile ransomware attack targeted the police force in Tewksbury, MA. The Tewksbury Town Crier reports that the local police department was forced to pay the ransom in order to regain access to their systems.

While every CIO fears a ransomware attack on their network, one major question still looms: Who is responsible for the sudden influx of ransomware infections in the past 18 months, and why are these malicious actors intent on causing chaos?

Read More

Topics: Safety & Security, Ransomware, IT News & Updates

8 High Profile Ransomware Attacks You May Not Have Heard Of

Posted by Gregory Wolf on Jul 5, 2016 11:00:00 AM

With the growing popularity of ransomware cyber attacks, we thought we'd spend the next few weeks covering the topic so you can better understand what ransomware attacks are, who's behind them, how to protect against them, and what to do if you become a victim of such an attack. This is post 4 of 6.

Organizations of all sizes must deal with the reality that their enterprise could be at risk for a ransomware attack. Police stations, hospitals, and even local governments have become victims of ransomware attacks. Many of these attacks have made international headlines causing the FBI to issue a special report.

Let's dig deeper into some of the high profile ransomware attacks that you may not have heard about.

Read More

Topics: Safety & Security, Ransomware, IT News & Updates

Ransomware Highlights the Importance of a Solid Backup Infrastructure

Posted by Gregory Wolf on Jun 28, 2016 8:00:00 AM

With the growing popularity of ransomware cyber attacks, we thought we'd spend the next few weeks covering the topic so you can better understand what ransomware attacks are, who's behind them, how to protect against them, and what to do if you become a victim of such an attack. This is post 3 of 6.

In every disaster recovery scenario, the future of your enterprise hinges upon the reliability of your data backup infrastructure. How can you be certain that your enterprise can recover from a disaster recovery scenario?

A ransomware infection can potentially lead to a full-fledged disaster recovery operation. In some instances, you could equate a widespread ransomware infection to a complete and total loss of your infrastructure.

Now more than ever, enterprises are challenged with backing up their data rapidly and without interruptions to normal business processes. In addition, it is imperative to have a backup of your data if you wish to mitigate the impact of a ransomware infection.

Read More

Topics: Safety & Security, Ransomware, IT News & Updates

How Does Ransomware Infect a Network?

Posted by Gregory Wolf on Jun 21, 2016 8:00:00 AM

With the growing popularity of ransomware cyber attacks, we thought we'd spend the next few weeks covering the topic so you can better understand what ransomware attacks are, who's behind them, how to protect against them, and what to do if you become a victim of such an attack. This is post 2 of 6.

Ransomware is rapidly becoming a hot topic in IT security. With hackers collecting over $300 million from ransomware in 2015 alone, every IT professional should know ins and outs of ransomware.

Ransomware in itself isn't that sophisticated. Most ransomware viruses infect computers through spam email, malicious websites, or infected downloads. Once infected, a small application begins parsing all of the files on your system while scrambling the data inside.

Let's take a closer look at each of the most popular ransomware attack vectors and how enterprises can setup defense systems that will mitigate these exploits.

Read More

Topics: Safety & Security, Ransomware, IT News & Updates

Ransomware: The Cyber Threat No One is Talking About (but Everyone Should be)

Posted by Administrator on Jun 14, 2016 8:00:00 AM

With the growing popularity of ransomware cyber attacks, we thought we'd spend the next few weeks covering the topic so you can better understand what ransomware attacks are, who's behind them, how to protect against them, and what to do if you become a victim of such an attack. This is post 1 of 6.

While many organizations are well aware of traditional cyber threats, ransomware seems to be the one cyber threat that no one is talking about. Unfortunately, ransomware may not even be on the map in terms of threats that organizations must mitigate. Because of this, organizations have largely taken a reactive approach to ransomware infections.

Enterprises may even underestimate the possibility of a ransomware attack happening on their network due to the security procedures already in place. What many CIOs fail to realize that is ransomware is becoming more stealth, and in many instances these infections get past traditional security checkpoints.

Now more than ever, IT departments must perform a ransomware threat assessment on their network regardless of the protections already in place.

Read More

Topics: Safety & Security, Ransomware, IT News & Updates