Dropbox is not a remote access solution article feature

The Scenario in Brief During this challenging time, we all have had to scramble to adjust to a new normal, both on a professional and personal level. Here is an … Read more

Phishing Attacks on the Rise

An increasingly common cybercrime, phishing is the term for when criminals attempt to get users to provide them with sensitive information via the internet, or in the past, phone calls … Read more

Sophos Security

At Palitto Consulting Services, we are always working hard to ensure that we offer our clients the best possible value. Part of that is a commitment to continual education. Our … Read more

Cyber Security

Technology helps businesses become more efficient and connected, but it comes with downsides as well. Flaws in security can allow criminals to access important data, putting both companies and clients … Read more

Joe Miller News Story Photo

Joe Miller recently completed the course, Data Mining, provided by the College of Engineering at Ohio State University. This course is one of four non-credit courses in the Certification in … Read more

Storagecraft Icon

Steve Pallas and Trent Gasser completed StorageCraft Engineer Training and are StorageCraft Engineer Certified by successfully passing the Certification Exam. StorageCraft is a disaster recovery, system migration and data protection … Read more

Dan Allen Photo

Members of the Dalton OH Chamber of Commerce learned about the latest malware and security threats that business networks are exposed to in 2010 at the Monthly Chamber Breakfast meeting. … Read more

Ohio Internet Crime

View details found in the 2006 Ohio IC3 Internet Crime Report View PDF – 16KB

Data & System Security Icon

View PDF – 284KB

Government Capital Icon

U.S. Government agencies are conducting electronic war games this week to test the government’s ability to respond to the digital equivalent of Hurricane Katrina. The exercise, dubbed “Operation Cyber Storm,”… … Read more

Data & System Security Icon

What is information security and why should you invest in it? – Gartner Research View Article