Fulton County Ransomware

From Panic to Protection: Lessons Learned from the Fulton County Ransomware Disaster

What Happened? The Fulton County ransomware attack was carried out by financially motivated hackers, disrupting key county services. The incident involved cybercriminals claiming responsibility for the attack and listing Fulton County as a victim on their dark web platform. The attack, attributed to the LockBit group, involved leaking internal documents, CONTINUE READING

CISSP Blockchain Technology

CISSP Certification: No Blockchain Technology Needed?

At the time of writing this article, the Certified Information Systems Security Professional (CISSP) certification, managed by (ISC)², does not specifically require knowledge of blockchain technology.  Blockchain is a decentralized and distributed ledger technology that securely records digital transactions across multiple computers. The technology is notable for its robust security CONTINUE READING

passkeys vs passwords

Quick Overview of Passkeys vs Passwords

Lately there has been much talk about passkeys vs passwords. Apple’s iOS 17 is offering the capability and there are already much available on references to implementing passkeys across Microsoft’s various platforms, namely Microsoft 365. That said, I can provide an overview of what “passkeys” might refer to and the CONTINUE READING

Google Workspace Data Migration

Migrating from Microsoft 365 to Google Workspace

Migrating a 200-user Microsoft tenant to Google Workspace (formerly G Suite) is a complex undertaking that requires careful planning and execution. Below is a detailed technical plan that outlines the necessary steps, estimated budget, timeline, and risk mitigation strategies for a successful migration: Pre-Migration Preparation Assessment and Planning: Perform a CONTINUE READING