English

Spruce News

Posts by:

Albert Balcells

Blue Microsoft Azure logo vs. yellow-orange and black Amazon Web Services logo

The Advantages of AWS and Azure

Today, many businesses are moving their entire on-premises infrastructures to the cloud. There are many providers offering cloud-based services, but two of the most well-known are AWS and Microsoft Azure. In this article, we examine the strategic benefits that each has to offer.

Read More

An Overview Into Data Privacy

In a world of extreme interconnection and digitization, the modern-day citizen has grown to deeply cherish their privacy. Privacy comes in many different forms, but for the purposes of this article, we examine it from the perspective of data.

Read More
IT Infrastructure digital representation

The Top Threats To The Cloud in 2023

As businesses continue to transition to cloud-based data storage and computing, the threat of hacks and attacks to the cloud will continue to grow. In this article, we outline some of the major threats to the cloud that organizations should be privy to.

Read More

How to have an effective security awareness program

Security awareness training has always been a challenge, and this was exacerbated by the COVID-19 pandemic. Give that we now realized that the remote workforce is undoubtedly a permanent fixture in corporate America, it is time to rethink how you train your employees to ensure they maintain a strong level of cyber hygiene.

Here are some of the top things to consider:

Read More
Hand clicking on laptop keyboard with an overlay of binary code in the shape of a skull.

Top 6 Threat Vectors

As we progress into the 2023 year, many Cyber pundits have now made their predictions as to what this year will look like on the cyberattack landscape. Some of the most feared hacks are on critical infrastructure, such as our water supply, oil, and natural gas pipelines, nuclear facilities, electric power grid, etc. While any attack on these systems will have cataclysmic-like effects, it is important to remember that the threat vectors used for these attacks have roots dating all the way back to the simplest attack structures, dating back to the 1990s. 

Read More