Ransomware gang REvil creeping back in I’ve covered the happenings of REvil for a long while now, as the four readers out there may already know.  With recent events, I've jumped back into the recent happenings concerning REvil. Back in October 2021, their operations took a...

Don’t ignore internal security evaluations In today’s climate of expanding attack surfaces and threats, preparing for them is essential for long-term IT health. An enterprise will take several steps to strengthen its security layer, and one way of doing such is with a security risk assessment....

CISA order to address VMware security threat CISA has been in the process of releasing guidelines for critical infrastructure networks. However, in mid-May 2022, a new emergency directive was issued. The directive is aimed at five specific VMware-based services, as CISA determines they are “unacceptable federal risk.” The...

Current legislative reporting requirements on breaches create more problems than they solve We're living in "interesting" times when it comes to the United States' cybersecurity. There is a concentrated effort to rehabilitate, renovate, and bring security standards up to par in the nation. As you know,...

Understanding Data Swamps Everyone saves files, media, and programs to a set of folders on their PC system or network. Anything from documents to videos makes up these files. Over time, the more files you have, the need for organization rises, accomplished by separating said files...

Is your office switching buildings or moving into a new suite? Bytagig has you covered with full-service IT relocation services. We handle everything from breaking down your computers and hard drives to bringing everything back up and running at your new site. We plan out...