Network firewalls have gotten better and better at blocking risks. They do their job almost 100% of the time. But, when that 1-in-a-million threat makes it past security and wreaks havoc on your data, the firewall is not enough to protect your business. What will you do then? Usually, the answer is to restore your […]
LATG is proud to announce that we have achieved Dell Gold partnership status. We look forward to continuing to grow the LATG Dell Technologies partnership. Our engineers can implement Dell solutions to support and grow our customers’ business in the right direction.
Lesson from an enterprise implementation – Download PDF
Microsoft Exchange Autodiscover protocol found leaking hundreds of thousands of credentials. Email clients fail over to unexpected domains if they can’t find the right resources Exchange’s Autodiscover protocol, specifically the version based on POX XML, provides a way for client applications to obtain the configuration data necessary to communicate with the Exchange server. It gets […]
Epik data breach impacts 15 million users, including non-customers Epik, the domain registrar known for hosting several large organizations, has confirmed a hack of its systems, a week after attackers branding themselves with the Anonymous hacktivist collective label said that the group had obtained and leaked gigabits of data from the hosting company, including 15 […]
The article below is made possible by our Security Partner Fortinet. Ransomware is the hottest topic of the day. Every company needs to have a solid ransomware strategy in place. This is no surprise, as Fortinet’s FortiGuard Labs reported a more than 10X increase in ransomware activity in the last year. Resiliency and response are key. The industry average […]
The article below is made possible by our Security Partner Fortinet Phishing Definition A phishing attack is a type of cybersecurity threat that targets users directly through email, text, or direct messages. During one of these scams, the attacker will pose as a trusted contact to steal data like login, account numbers, and credit card […]
An LATG video recommendation. The YouTube Video below provides a fantastic 16 min journey into the future of servers for the new generation datacenters.