Please reload

Follow Us

August 22, 2019

Combating ransomware in a threat landscape where attacks are increasing isn’t easy for channel partners, but with the right solution in place, the fight becomes winnable

August 2, 2017

So now you have Third Wall, and you're trying to figure out the best way to use all of that power at your fingertips.  Not a bad problem to have!  We have a good suggestion on how to get started.

You'll notice that, with 56 different policies to apply, some will im...

August 12, 2016

If you aren’t afraid of it, you should be. According to Malwarebytes, 40% of companies have suffered ransomware attacks in the last year alone.

http://www.itpro.co.uk/security/27058/40-of-companies-suffer-ransomware-attacks

And this is actually just large companies – tha...

July 27, 2016

Organizations are unprepared for future strains of more sophisticated ransomware, according to the Cisco 2016 Midyear Cybersecurity Report. Fragile infrastructure, poor network hygiene, and slow detection rates are providing ample time and air cover for adversaries to...

July 26, 2016

According to network security company Carbon Black, a new kind of ransomware has been discovered which is exploiting the PowerShell scripting language that has been built into the Windows operating system.  Read the full article below, and consider if you are effective...

July 26, 2016

SANS Top 20 Critical Security Controls for Effective Cyber Defense – do these now!  https://www.sans.org/critical-security-controls  And let Third Wall help you.  Our LabTech Plugin will help take care of so many of these.  And without them, you’re a cybersecurity...

July 20, 2016

“Implement electronic procedures that terminate an electronic session after a predetermined time of inactivity.”

Words of wisdom every MSP and IT shop should ensure is in place. Even more, it is a HIPAA requirement! If you don’t have this, you will fail HIPAA audits. An...

July 15, 2016

There is a powerful new data stealing Trojan being spotted on USB devices everywhere. This widely available malware relies on the particular USB device on which it is installed and leaves no evidence on the compromised system.  Known as the “USB Thief”, it utilizes a s...

July 12, 2016

Using LabTech for improving Operational Cybersecurity is just a no-brainer – given the innate ability of LabTech to manage each and every computer’s settings, and to then continuously monitor it for any deviation, Third Wall dramatically reduces the threat to the compu...

June 24, 2016

We just got back from Orlando, where we sponsored Automation Nation 2016 and had our first-ever booth – and what a show it was! We were overwhelmed with the positive response that we received, with a continuous flow of people asking “what’s Third Wall?” We had a great...

Please reload

  • Facebook Basic Square