Appalachia Technologies Blog

Appalachia Technologies team is comprised of a diverse mix of IT professionals, some of whom have been on the forefront of IT since the industry’s inception. Through the years, our team has developed a wide array of experience in understanding individual needs and how they relate to your business.

The Interim DFARS Rule and What It Means for You

The Cybersecurity Maturity Model Certification (CMMC) was formally made part of the Defense Federal Acquisition Regulation Supplement (DFARS) in January 2020 and updated to CMMC 2.0 in November 2021. The decision affected more than 300,000 defense industrial base (DIB) members, and many found themselves drowning in all kinds of unnecessary noise surrounding CMMC and its implications on existing and future government contracts.

Continue reading

How to Stay Ahead of AI-Powered Cybersecurity Risks

How to Stay Ahead of AI-Powered Cybersecurity Risks

While artificial intelligence (AI) has many benefits for businesses, it has also created new vulnerabilities that cybercriminals can exploit to carry out complex cyberattacks that are difficult to detect and mitigate. Using AI, hackers can create convincing phishing emails that bypass spam filters. Similarly, cybercriminals can leverage AI to manipulate security systems and gain unauthorized access that causes irreparable damage to your business and your reputation.

Continue reading

Don’t Trust These Zero Trust Security Myths

Zero-Trust-Social-AdsAd-17_800x800

In today’s threat landscape, where businesses are constantly at risk of being targeted by a cyberattack, adopting a zero-trust security model could be a wise decision from a cybersecurity point of view.

Continue reading

3 Steps to Zero Trust Cybersecurity for Businesses

Zero-Trust-Social-AdsAd-16_800x800

Cyberattacks have become rampant and have also grown in sophistication. A simple lapse in your network security could lead to a chain of events that could prove catastrophic for your business. You can avoid this by implementing a robust cybersecurity framework such as zero trust.

Continue reading

It’s Time to Bust These 4 Ransomware Myths

Busting the Top 3 Ransomware Myths

In today’s digital age, ransomware attacks are becoming increasingly frequent, sophisticated and costly. With cybercriminals constantly evolving their tactics and targeting businesses of all sizes, organizations like yours must proactively safeguard your data and systems. Unfortunately, many companies fall prey to common ransomware myths, which can leave them vulnerable to attacks and unprepared to respond effectively in the event of an incident.

Continue reading

The Best Defense Against Ransomware

What's the Best Defense Against Ransomware?

Ransomware is a type of malicious software that encrypts files on a device or network, making them unusable until the victim pays the attacker a ransom. What started as a simple virus spread through floppy discs in the late 1980s has now evolved into a billion-dollar cybercrime industry.

Continue reading

Mike Miller Takes on SecureWorld Charlotte

Mike Miller was invited to speak at SecureWorld Charlotte in a fireside chat titled, "Your Career in Cybersecurity" in early March.  Mike is sharing his experience - tag along as he gives his first-hand account!


Tags:
Continue reading

The Dangers of Running Outdated Software

The Dangers of Running Outdated Software

Your software is only as good as its last patch. Reaching End of Life (EoL) or End of Service (EoS) means critical patches and updates are no longer available, leaving you vulnerable to various problems.

Some make the mistake of not rushing to upgrade the software because it is still functional. However, outdated software can lead to security risks, data loss, compliance issues, and more.

In this blog, we will discuss the primary implications of running outdated software and explain why it’s crucial to take action when your software reaches EoL or EoS.

Continue reading

4 Practical Steps to Take When Hardware and Software Expire

4 Steps to Take when Hardware ExpiresWhen a software or hardware product reaches its End of Life (EoL) or End of Service (EoS), it's no longer supported by the manufacturer. This can be a cause of concern for organizations like yours because unsupported technologies have no routine internal security measures or support from the manufacturer.

The good news is that there are steps you can take to mitigate the risks that come with EoL software/hardware and protect your business. Read on further to learn about them.

Continue reading

The Future Is Flying High - Zero Trust World Day 2

All flights, regardless of the airplane, encounter some form of turbulence. A wise person (my mother) once told me before my first flying experience that just because there is some shaking and bouncing on the flight, to not worry, because it is all part of the glory of flying. This of course came on the heels of overwhelming news coverage of a plane crash in Charlotte, North Carolina that was caused due to wind shear and turbulence. Needless to say, I was anything but calm until I got into the air and witnessed the majesty of the earth from 37,000 feet. Day two of ThreatLocker’s Zero Trust World conference had a very similar theme.

Continue reading

3 Technology End-of-Service Myths

It'3 Common Myths about Tech End of Lifes crucial to keep all software and hardware up to date to maintain optimal security. If you don’t, cybercriminals can easily infiltrate your network and the chances for downtime increase significantly. However, many businesses don't realize that expired software/hardware can actually be one of the most prominent security risks hindering their success.

Continue reading

Top 5 Security Assessment Findings

Top 5 Security Assessment Findings narrow smallest

Even organizations with solid cybersecurity programs will have findings from a security assessment.  After all, cyber attacks and attackers continue to learn and evolve, always trying to be one step ahead of their prospects.  Through our years of performing security assessments, here are the Top 5 areas that we have found to need remediation work post-assessment.

Continue reading

2021 Year in Review - Significant Cybersecurity Events

2021 Year in ReviewThe year is 2021.  We don’t have flying cars or robot maids, but nearly 5 billion souls worldwide are now connected to the Internet and to each other.  This is a beautiful thing and a remarkable feat of human ingenuity.  However, every rose has its thorn (to borrow from the great post-modern philosopher Bret Michaels) and to us who work in cybersecurity, 2021 was thornier than ever. 

Here is Appalachia’s 2021 Cybersecurity Year in Review!

 

Continue reading

What is Penetration Testing – Finding Vulnerabilities Before the Bad Guys Do (appTECH TALK Ep. 2)

If you are an organization with digital assets to protect, you’ve most likely heard the term Penetration Testing, also known as Pen Testing.  Penetration testing is the process used to find vulnerabilities and leverage them to hack an organization.

Continue reading

Social Engineering: How Kind Humans Can Cause Big Breaches (appTECH TALK Ep. 6)

Humans are the smartest beings on earth.  So why is it that they are the number one cause for breaches that cost millions of dollars?  It’s because they are kind.

Because of the kindness of human beings, they are easily manipulated by bad actors to give up private information or even hold a door.  This is the foundation of Social Engineering.

Continue reading

Top 8 Sources for Cybersecurity News

Not a single day goes by that we don’t either hear the word security or read the word security.  See?  You’ve already read it twice!  The internet is full of so much noise that it sometimes can be hard to filter out information that pertains to you and your organization, as well as what is credible.  Today I thought I’d take a moment to give you some great sources for security news.  These are sources that are very accurate and trustworthy.

Continue reading

The ABC's of Ransomware

Ransomware – The What, Where, and Why

Everyone has heard stories by now of an organization getting hit by ransomware.  From individuals to small and enterprise-level organizations, it can pop up anywhere and cause havoc.  What is it?  Where does it come from? Why isn’t it going away?  Today we’re going to break it down.

Continue reading

The OWASP Top 10: Security Logging and Monitoring Failures

Recently, we explored the Open Web Application Security Project (OWASP) Top 10 (Allergic to Bees? Don’t Get Stung by the OWASP Top 10) by looking at what it is and why it matters.  Then we took a closer look at one area of the Top 10 – Security Misconfiguration. Next in line for a deeper dive is Security Logging and Monitoring Failures.  This particular category is in place to help detect, escalate, and respond to active breaches.

Continue reading

Did You Know Hardware and Software Expire Too?

We are all aware of the term “use by date.” It is regularly used when talking about food and medications and refers to the date after which the product is no longer safe to consume. However, did you know that your software and hardware can expire too?

Continue reading

Zero Trust World is Clear to Land - Day 3

Time flies when you’re having fun, which is an accurate depiction of the last three days at the Zero Trust World conference in Orlando, Florida. There is quite a buzz going through the air about ThreatLocker after they announced their new endeavor, ThreatLocker Ops, which is their first foray into cyber attack detection. The ThreatLocker booth is hard at work answering questions and fielding requests to beta test the product. Not to mention their cool cash machine that new clients get to spend 30 seconds in to grab as much money as possible! It has been fun to watch.

Continue reading

News & Updates

APPALACHIA IN THE NEWS: Appalachia Technologies Cited in Case Study to Improve Efficiencies and Service Delivery   Improve and Evolve - this is one of the five Core Values of Appalachia Technologies and one we believe helps us to stay at the forefront of our industry.  Our Technical Assistance Center (TAC), while performing well and delivering quality service, was being challenged by processes for documentation that were manual and outdated.  Not satisfied with the current way of doing this, Chris Swecker, Manager of TAC, began to explore IT Glue.  IT Glue centralizes information, allowing for efficiencies in response time, accuracy, and client satisfaction.  As he explains, "IT Glue became our source of truth."  Chris and his team built on the success by incorporating additional tools to assist with password rotation and a client-side tool for password management and shared documentation.  

Contact Us

Learn more about what Appalachia Technologies can do for your business.

Appalachia Technologies
5000 Ritter Road Suite 104
Mechanicsburg, Pennsylvania 17055