How to Negotiate With Ransomware Attackers
Security researchers investigate the ransom negotiation process to create strategies businesses can use if they face an attack.
Read More

Outsourcing Backups to Prevent Data Loss
How important is your data? Would your company be able to survive without it? A general backup of data is no longer enough to keep it protected.
Read More

3 Tips For Stopping the Next Insider Attack
A former employee working with a New York Credit Union used her access to delete 200,000 files after being fired. How could've it been stopped?
Read More

How the Cloud Enables Fast, Easy Recovery From Attacks and Disasters
Used properly, the cloud can provide very strong protection against ransomware attacks..
Read More

Businesses Don't Know How to Manage VPN Security Properly and Hackers Are Taking Advantage
Cyber attacks targeting vulnerabilities in virtual private
networks (VPN) are on the rise, and many
organizations are struggling to protect their networks.
Read More


In case you've missed any previous editions of This is IT, you can view them online at Visual Edge's website on the Resources page. 

You'll also find other helpful tools such as eGuides, checklists, videos and more. 


The cost of a technology outage can cripple a business. Use this Recovery and Downtime Cost Calculator to see a general analysis of what an outage could mean to your business.

Visual Edge IT
6050 Corporate Way, Indianapolis, IN, 46278
Phone: 866-863-2266