Call :+1 718-393-5343
Why Every Organization Needs an Incident Response Plan

Why Every Organization Needs an Incident Response Plan

In today’s rapidly evolving digital landscape, small and medium-sized businesses (SMBs) often underestimate the importance of cybersecurity. Many SMB owners.

Protect your digital life in the face of evolving threats! (MoAB follow-up)

Protect your digital life in the face of evolving threats! (MoAB follow-up)

In the few days since the MoAB (“Mother of All Breaches”) was discovered we have already been made aware of.

User Training, Email Security, and System Monitoring

User Training, Email Security, and System Monitoring

In today’s digital world, businesses face an increasing number of cyber threats. At CDML Computer Services, we emphasize the critical.

System Patching, Upgrading, and Monitoring

System Patching, Upgrading, and Monitoring

In the ever-evolving landscape of cybersecurity, recent incidents like the Volt Typhoon exploit serve as stark reminders of the vulnerabilities.

Alert: Dell Security Breach and the Risk of Malicious Physical Media

Alert: Dell Security Breach and the Risk of Malicious Physical Media

A recent security breach at Dell has compromised the personal details of millions, emphasizing the ongoing vulnerabilities in digital security.

Understanding the Ascension Healthcare Cyberattack: Implications for Your Business

Understanding the Ascension Healthcare Cyberattack: Implications for Your Business

Recently, Ascension, one of the largest private healthcare systems in the country, fell victim to a significant cyberattack. This event.

Protect Your Personal Information in the Wake of the Change Healthcare Data Breach

Protect Your Personal Information in the Wake of the Change Healthcare Data Breach

by Len Kaplan, CEO of CDML Computer Services, Ltd. While CDML Computer Services primarily offers IT solutions to businesses, we’re.

Secure Your MS Office 365 with 2FA

Cybercrime is on the rise during the COVID-19 pandemic. It is especially dangerous for users of Microsoft Office 365 and Google G-Suite because a successful attack provides the criminals with access to the user’s email, contacts and cloud storage. As many users are relying on these platforms while working outside their offices, the wealth of information can be staggering. Theft of this information can be devastating to the victim and/or their business.

Fight Fire with Firewall!

Protection of private property is a fundamental right protected in a strong democracy.     -Jim Ryun  In today’s world, data is extremely important.

The Bad Guys Are at It Again! Ransomware Attacks Are on The Rise.

While we all laughed at the absurdity of a criminal mastermind seeking a one-million-dollar ransom, it’s quite a different scenario when data belonging to a school, a hospital or a business is held for ransom. Not only are these criminals decimating their victim’s operations by limiting access to their vital data, but now they are also threatening to release the PII (personal identifiable information) that they obtained in the attack.