Avoiding Content Management Pitfalls in the Modern Website

Avoiding Content Management Pitfalls in the Modern Website

Imagine you've written a post for your association's website that you're particularly proud of, and you can't wait for your members to read it. It's a well-researched, beautifully crafted piece that you've put a lot of care into making it visually appealing, too. Those desktop...


What Would You Do if You Lost Everything?

What Would You Do if You Lost Everything?

"Based on the current trends of backup initiatives, Gartner predicts that by 2018, 50% of organizations will replace their current backup application. By 2017, the number of organizations using the cloud as a backup destination will double to 25%. Luckily, there are several procedures that you...


VPNFilter Malware Infection

VPNFilter Malware Infection

On Friday, May 27th, the FBI released an announcement stating that “Foreign cyber actors have compromised hundreds of thousands of home and office routers and other networked devices worldwide.” [0] The compromise is a malware strain dubbed VPNFilter by the researchers who discovered it. Authorities...


CPU Vulnerabilities “Meltdown” and “Spectre”

CPU Vulnerabilities “Meltdown” and “Spectre”

2018-01 ATS Security Advisory -CPU Vulnerabilities “Meltdown” and “Spectre Summary A new class of vulnerability was recently discovered and reported by security researchers. Two specific examples of this vulnerability, called “Meltdown” and “Spectre” can allow an attacker to read any memory content on a computer. This memory...


Data Privacy

Data Privacy

ATS will determine your posture against current regulations. We ensure that your data practices are in line with privacy regulations, guidelines, and good practices. We provide awareness and training around the current privacy landscape....



Adobe Type Manager Vulnerability

Adobe Type Manager Vulnerability

Summary On Monday, March 23, 2020, Microsoft’s Security Response Center released a Security Advisory documenting vulnerabilities in Adobe Type Manager Library, which is a program built into all currently supported versions of Windows. This vulnerability may allow an attacker to craft a document, which, when previewed...


Continuous Security Monitoring (CSM)

Continuous Security Monitoring (CSM)

It is no longer a matter of if, but when you will be attacked. Regardless of the size of your business, we are all targets of cyber crime. ATS is positioned to help you develop your security strategy to identify and mitigate the specific threats...


IT Strategy & Consulting

IT Strategy & Consulting

Technology is ever-evolving, it’s the nature of the beast. And having an innovation advisor by your side is vital. We will tailor a strategy that fits your needs, and uncover the right technology for your toughest business problems—no matter the industry....


Vulnerability Assessment & Penetration Test (VAPT)

Vulnerability Assessment & Penetration Test (VAPT)

Cyber attacks are at an all-time high and customers are demanding that organizations safeguard their personal data more now than ever. Attackers have shown unprecedented savvy in how they are breaching organizations. Stopping them requires understanding their motivations and how they operate. Get a glimpse...