Cybersecurity is business survival and CISOs need to act now
Cybersecurity is an unending challenge for businesses. Just as they catch up, the bad guys innovate their techniques to continuously stay one step ahead. It's an issue that will persist meaning cyber risk has become a business risk.
February 30, 2024
Why home cybersecurity is important
Our lives are more and more online than ever, and the wealth of security threats online is only increasing. It's important to protect yourself online, and with a few easy steps and some simple considerations, you can vastly decrease your chances of being exploited. We'll examine what features protect your home network from cybersecurity attacks, where some of the weak points are, and what you can do to ensure you're not one of the unfortunate few who are left picking their lives back up after being compromised.
February 27, 2024
10 Security Tips Your IT Department Wishes You'd Follow
Your work IT colleagues probably seem a bit grumpy sometimes, and there's a reason: They're always busy working behind the scenes to keep you secure from hackers and other digital threats. You can make them less grumpy (and improve your own online security outside the office too) by following these tips.
June 26, 2024
How to secure your home network against online threats
Your home network keeps all of your connected technology online, so it makes sense to take a few precautions to keep it secure. For the most part, keeping your home network secure is about making sure you've got all the right settings selected and making sure your software is up-to-date. Still, there are also a few extra steps you could take, such as setting up a firewall or signing up for additional security with your router.
October 19, 2024
Creating the perfect ecosystem for cybersecurity
Cybersecurity is an ever-evolving field and cannot be set up once and then forgotten. As data and applications move to the cloud, businesses can enjoy various benefits, but many struggle to protect their networks from constantly changing cyber threats. Ransomware attackers have recognized the value of targeting smaller organizations and tailored their attacks to exploit businesses that they believe will pay immediately, often supported by cyber insurance, rather than investing in defense measures.
October 19, 2024
6 ways to find out what's hogging your bandwidth at home
Ever thought your home network felt sluggish, and you wanted to know what's eating up all your bandwidth? While it could be someone stealing your Wi-Fi, the reason is usually one or more of your devices are hogging the available bandwidth for themselves. These days, there are plenty of tools to check which devices are using more than their share, from programs to inbuilt bandwidth checkers in your operating system or router.
June 18, 2024
Evolving enterprise security beyond traditional passwords
In the ever-evolving landscape of cybersecurity, Identity and Access Management (IAM) remains a vital link in the cybersecurity chain. In fact, the greatest threat can often come from the person sitting at the next desk over. Everyone has moments where they are vulnerable to attacks exploiting their biases, and the challenge with using passwords is that users can quickly get fatigued. Constantly creating and keeping track of a burgeoning number of passwords needed to navigate the myriad systems they interact with daily is a task that sees many of us seek workarounds if we can.
September 17, 2024
Should You Encrypt Your System Drive?
If you're a Windows user, you may have been surprised to learn that from an update in May 2024 onward your system drive will be encrypted by default. Linux users have been presented with the choice to encrypt their system for years now. Is full-disk encryption a good thing, though?
How to securely wipe an old hard drive
Even when an old computer won't start up anymore, the hard drive is still in there. From financial data to private photos, that drive could hold all sorts of private information. It makes sense, given that context, that you might be nervous about just dropping it off at the recyclers. We've talked about how to […]
Survivability is defined as the "capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents".
Founded in 2011, Survivable Systems Design (SSD) is a Systems Engineering solutions provider.
Survivability is defined as the "capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents".
SSD Designs and builds Information Technology (IT) systems which meet/exceeds Industry and Military/Government Standards of Survivability.
Systems Design
Systems Deployment/Integration
Design of IT System which meets/exceeds Industry, Military/Government standards of survivability.
Deployment/Integration of IT Systems designed by SSD or other provider(s).
Systems Support
Systems Management
Support of IT Systems designed/deployed by SSD, or other provider(s).
Full Life-Cycle Management of IT Systems, designed/deployed by SSD or other provider(s).
This links to the same named Webpage of the Services Section.