Andrew Edstrom

Andrew Edstrom
has over 20 years of network engineering and information technology experience. For over 11 years he has focused on IT Security and Compliance. He has a proven history of leading successful security teams and programs within a Cloud Service environment, specializing in security education, program design and architecture, compliance, and privacy network vulnerability assessments. An expert on the application of Risk Management, WISP, HIPAA and PCI-DSS. He has a passion for helping the organizations understand the why, what, when and how of security.

7 Things Your Disaster Recovery Plan Must Include

This year has been a mind-blowing series of natural disasters. First, Hurricane Harvey completely flooded Houston, causing billions of dollars in damage and claiming more than 70 lives. Then, Mexico experienced a massive 8.2 magnitude earthquake to the southern state of Chiapas. Simultaneously, ...

Read More

New WannaCry Ransomware Attack Cripples Companies and Agencies Across the World

It seems impossible that just a few weeks after the WannaCry Ransomware debacle in May there could be another serious compromise leveraging the same exploit. 

Read More

15 Important Facts About the WannaCry Ransomware Virus [Infographic]

The WannaCry outbreak is the largest ransomware attack on record so far with the majority of devices infected within a single day. With all the different news stories out there, we thought we'd put together this infographic to highlight the main points. Enjoy!

Read More

Facebook and Google are Swindled for more than $100 Million—Here's the Lesson

Have you read about this yet?

Read More

7 Must-Knows About Security Spending in 2017 [SlideShare]

Read More

Is Your Data Safe in the Cloud? A Reflection of the AWS Outage

Cloud computing has given the technological world a much-needed gift in the form of easy storage and access. Whether you are an app developer, app user or binge-watcher of shows, the cloud provides you with the flexibility to operate from everywhere without losing any of your data.

Read More

Recent Wordpress Vulnerability Hacks 1.5 Million Pages—Here's the Lesson

Vulnerabilities within third-party software might be your greatest risk, because you can’t control or influence the code. And once the the fix is out, the cat's out of the bag. It becomes a "known vulnerability". Known to the manufacturer/developer, known to its customers and most significantly,

Read More

FTC sues D-Link for Gross Lack of Security—Are You Protected?

The lawsuit comes after major distributed denial of service (DDoS) attack in October last year affected a number of prominent websites and services, driven by a botnet that took advantage of insecure IoT devices.

Read More

Video: How to Recover a System From a Locky Ransomeware Attack

Every organization will succumb to an attack at some point. It is not a question of "if", but "when"—and will you have a plan in place to address the recovery or are we just going to suffer the consequences?

Read More
1 2

Phishing Malware

Can your employees differentiate between a legitimate email and targeted phishing?

92% of malware was delivered through email in 2018.  And Phishing emails are the #1 method of deploying malware.  Contact us today to learn more about our Phishing Awareness Training.

Learn More

About UTG

UTG is a Mid-Market Managed Service Provider that partners with your organization to leverage technology strategically.  We help you meet company objectives, increase efficiencies and productivity through technology.

Categories

See all