by Ashley Pusey, J.D. | Jul 9, 2021 | Cyber Security, Ransomware, Uncategorized
Ransomware as a Service: The Service that Indiscriminately Attacks Written By: Ashley Pusey, J.D., Privacy, Legal & Compliance Lead, Maureen Data Systems While America was celebrating our country’s Declaration of Independence, Kaseya, a Floridian based Managed...
by Lyndsey Creamer | Jul 8, 2021 | Cloud Computing, Cyber Security, Microsoft
Maureen Data Systems (MDS): Microsoft 2021 Partner of the Year Winner For Immediate Release July 8, 2021 Maureen Data Systems (MDS) recognized as winner of the Bahamas and Jamaica 2021 Microsoft Country Partner of the Year Awards for the second year in a row! New...
by Lyndsey Creamer | Apr 15, 2021 | Cyber Security, Hacking, Malware, Microsoft, Phising, Ransomware, Remote Access, Remote Working
Secure unmanaged devices with Microsoft Defender for Endpoint now As we have entered into new hybrid work environments, businesses need to think about how they will proactively protect their organizations from the influx of new or “bring your own” (BYO) connected...
by Lyndsey Creamer | Mar 11, 2021 | Cyber Security, Data, Hacking, Malware, Microsoft, Phising, Ransomware
Microsoft’s responds to Exchange Server hacks as scope of attack grows Microsoft was made aware of initial attacks exploiting previously unknown vulnerabilities in Exchange Server in early January, two months before issuing patches, according to a new report Monday by...
by Lyndsey Creamer | Feb 9, 2021 | Cyber Security, Data, Hacking, Malware, Microsoft, Phising, Ransomware
Microsoft Defender Antivirus: 12 reasons why you need it Having the right cybersecurity strategy requires a delicate balance between protection and convenience. The scale tips and topples when one side outweighs the other. In the world of security, the scale has...
by Lyndsey Creamer | Feb 1, 2021 | Compliance, Cyber Security, Data, Digital Transformation
What Are the Steps Towards Implementing the Zero Trust Model? Zero Trust Model is a security concept that is massively different from conventional network security. In simple words, it acknowledges that trust is a vulnerability. In other words, it is a model that...