AUTHOR
Nick Campbell
Nick is the Senior Director of Security & Compliance at Liquid Web. He has over 20 years of experience in Technology and brings a wealth of knowledge and a strong understanding of data security to help safeguard our customers' environments.
7 Cloud Security Best Practices
For those looking to stay secure from the latest cyber threats, here are the top 7 cloud security best practices you need to follow.
Continue ReadingVirtualization Security: A Comprehensive Overview
Virtualization security ensures that multiple virtual instances of a device running a single physical hardware resource are protected.
Continue ReadingHow to Protect Your Business From Ransomware
Ransomware is virtual kidnapping of corporate data in exchange for a sum of money. Your protection from ransomware starts with these 5 steps.
Continue ReadingWhat are the Implications of Business Continuity for Cloud Computing?
Find out how to maintain business continuity when moving to the cloud, including considerations around support, data, access, and disaster recovery.
Continue ReadingHow To Develop a Security Awareness Training Program
Learn how to build a security awareness training from the ground up, including the 4 types of simulated attacks to include in the program.
Continue ReadingSecuring Your Infrastructure When Working From Home
Threats that aren't present in an office environment are quite real when working from home. Follow our best practices on remote work cybersecurity.
Continue ReadingHow Ransomware is Attacking Healthcare
When it comes to ransomware attacks on hospitals, knowing how to spot phishing or social engineering attacks is your number one safeguard against breach.
Continue ReadingThe 6 Considerations for Secure Remote Work
Need to ensure cyber security for teams with remote work? Ask these 6 critical questions to understand whether your remote teams and data are secure.
Continue ReadingA Deep Dive into CryptoLocker Ransomware Malware and How to Protect Yourself
Increase your cybersecurity awareness with analysis of the CryptoLocker ransomware attack, its history, and prevention techniques.
Continue Reading