Jackson Thornton Technologies News + Updates

Jackson Thornton Technologies has been serving the Southeast since 1999, providing IT consulting and managed services, technical helpdesk support, cybersecurity assessments, and business continuity and disaster recovery to small and medium-sized businesses.

Ticketmaster Suffers Major Data Breach

Ticketmaster Suffers Major Data Breach

The world’s largest ticket retailer is in hot water after their parent company, Live Nation Entertainment filed an 8-K filing with the Security and Exchange commission admitting that they had been hacked to the tune of 1.3 terabytes of information. That amounts to 560 million customers’ personal information that has been stolen from the company’s servers. Today, we take a look at the hack and what it means for consumers.

0 Comments
Continue reading

So, Your Business Project Failed… How Can You Learn from It?

So, Your Business Project Failed… How Can You Learn from It?

It can be challenging to deal with failure in any context, but in the case of your workplace projects and other efforts, it can be particularly harsh. This makes it all the more important to frame such failures as opportunities to grow in the future.

Let’s discuss six reasons an initiative may fail and the lessons that can be learned from these situations.

0 Comments
Continue reading

Research Shows Many New Cybersecurity Professionals are Doomed to Make Blunders

Research Shows Many New Cybersecurity Professionals are Doomed to Make Blunders

Unfortunately, cyberattacks will only continue in the weeks, months, and years to come, making it increasingly essential that businesses have access to cybersecurity expertise. Even more unfortunately, professionals with this level of expertise are becoming harder to find. Globally, we’re short almost four million people, and those we have are prone to make mistakes in their first few years. This comes from a report by Kaspersky, entitled “The Portrait of Modern Information Security Professional,” Let’s review what the cybersecurity developer found and what we can take away from these findings.

0 Comments
Continue reading

With a Massive Botnet Recently Disrupted, Let’s Review What a Botnet Is

With a Massive Botnet Recently Disrupted, Let’s Review What a Botnet Is

It was very recently revealed that a global law enforcement effort took down a massive botnet that was in action for almost a decade. In light of this, we wanted to review what a botnet is and how it works, drawing from these events for some context.

0 Comments
Continue reading

Why You Can’t Just Rip Memory from Your Computer

Why You Can’t Just Rip Memory from Your Computer

Transferring data between different computers and devices has become a routine task. Let's explore the steps you need to take before ejecting memory from a computer to ensure your data's integrity and the memory card's longevity.

0 Comments
Continue reading

The Impact Ransomware Has on All of Us

The Impact Ransomware Has on All of Us

We’ve spent the last few weeks discussing ransomware's impacts on different subsets. First, we discussed how a ransomware attack impacts the customers of the infected business, and then we touched on the infected business itself. To end, we want to touch on ransomware's impacts on society, specifically regarding economic health and geopolitical security, known as third-order harms.

0 Comments
Continue reading

You May Not Think You’re Popular, but Your Data Certainly Is

You May Not Think You’re Popular, but Your Data Certainly Is

Data is extremely important in the way that most businesses conduct themselves. This results in other people wanting that information, too. Today’s blog will look at how seemingly everyone online is out for your data. 

0 Comments
Continue reading

A Man-in-the-Middle Attack is Not to Be Underestimated

A Man-in-the-Middle Attack is Not to Be Underestimated

Have you ever heard of the “man-in-the-middle” attack or MitM? It’s a situation where your data is stolen by an onlooker who situates themselves in the right place at the right time. Data interception is a very real thing that your business should be prepared to fight against. Let’s discuss some strategies you can use to counter these sneaky attacks.

0 Comments
Continue reading

Have You Ever Considered What a Ransomware Attack Actually Does to Your Business?

Have You Ever Considered What a Ransomware Attack Actually Does to Your Business?

Last week, we discussed the many impacts your business suffering from ransomware has on “second-order harm,” downstream businesses, and average, ordinary people. This time, we wanted to return to “first-order harms”… those the impacted business has to deal with itself.

0 Comments
Continue reading

Have You Ever Considered What a Ransomware Attack Would Do to Your Customers?

Have You Ever Considered What a Ransomware Attack Would Do to Your Customers?

It can be too easy to look at ransomware as a business problem. After all, it attacks businesses, locking down their data for ransom, often selling it or spreading it, and sometimes altering it for the business if returning it at all. It can be too easy to overlook another impacted target in all the mess.

What happens to the people whose data a business has collected and uses?

0 Comments
Continue reading

CISA Advisory for Healthcare Providers: Black Basta Ransomware

In early May 2024, the Cybersecurity Infrastructure Security Agency (CISA) issued a Cybersecurity Advisory, in conjunction with the FBI, HHS, and other related organizations, describing the significant risk the Ransomware Black Basta presents to the healthcare community. This advisory memo can be found by visiting this link.

What is Black Basta?

Black Basta is a ransomware variant that has been targeting healthcare and other critical infrastructure organizations since late 2020. It is a type of malware that encrypts the files on a victim's computer or network and demands a ransom for the decryption key. Black Basta also steals sensitive data from the victims and threatens to publish it online if the ransom is not paid.

How does Black Basta infect systems?

Black Basta affiliates use common initial access techniques, such as phishing and exploiting known vulnerabilities. Phishing is a method of sending fraudulent emails that appear to come from legitimate sources, but contain malicious links or attachments that can install malware on the recipient's device. Exploiting known vulnerabilities is a method of taking advantage of security flaws in software or hardware that have not been patched or updated. Once Black Basta gains access to a system, it can spread to other devices on the network and encrypt the files on them.

What are the consequences of a Black Basta attack?

Black Basta can cause significant disruption and damage to the affected organizations. The encryption of files can render them inaccessible and unusable, affecting the delivery of essential services and operations. The exfiltration of data can expose the organizations to legal, regulatory, and reputational risks, as well as potential identity theft and fraud for the individuals whose information is compromised. The ransom demand can be very high, and there is no guarantee that the attackers will provide the decryption key or delete the stolen data after receiving the payment.

How can you protect your organization from Black Basta?

CISA has provided recommendations for prevention and response. Some of the key mitigations from CISA include:
• Backing up your data regularly and storing it offline or in a separate network.
• Updating your software and hardware with the latest security patches.
• Using strong passwords and multi-factor authentication for your accounts and systems.
• Training your staff to recognize and avoid phishing emails and malicious links or attachments.
• Implementing network segmentation and access control policies to limit the exposure of sensitive data and systems.
• Using antivirus software and firewalls to detect and block malicious traffic and activity.
• Reporting any ransomware incidents to your local FBI field office or CISA.

Black Basta is a serious threat to the healthcare sector and other critical infrastructure organizations. By following the CISA guidance and implementing best practices for cybersecurity, you can reduce the likelihood of compromise and minimize the impact of a potential attack.

0 Comments
Continue reading

Is Your Internal IT Buckling Under Pressure? We'll Lighten the Load

Is Your Internal IT Buckling Under Pressure? We'll Lighten the Load

There's a lot of pressure on (often understaffed and overworked) internal IT teams to manage and maintain increasingly complex systems. For businesses noticing signs of strain on their IT staff, seeking assistance from managed services providers (MSPs) could be the remedy. Here's how an MSP like us can alleviate the pressure and contribute to workplace wellness for all.

0 Comments
Continue reading

How to Prioritize Security in File Sharing

How to Prioritize Security in File Sharing

Business file sharing has become a daily routine. It's a crucial part of collaboration, communication, and overall productivity. However, with the rise of cyberthreats, file security is more important than ever. It's not just about sharing files but doing it securely and efficiently. Today, we'll look at some best practices for business file sharing.

0 Comments
Continue reading

Why It’s Good to Purge Your Digital Waste

Why It’s Good to Purge Your Digital Waste

So, what is digital waste?

Digital waste is all the useless data in our data storage that lingers until we do something with it. Extra files no longer needed, old emails and chats, and old, blurry pictures you never have and will never use… all qualify as digital waste. While it’s easy to discount digital waste as an annoyance (which it certainly can be), it creates a much bigger and more serious problem.

0 Comments
Continue reading

What’s Backup and Disaster Recovery, and Do I Need to Worry About It?

What’s Backup and Disaster Recovery, and Do I Need to Worry About It?

Nowadays, businesses need to be prepared for almost every circumstance. You may have heard the term “BDR” used to describe a method of attaining this level of preparation. We wanted to discuss this term in more depth, covering what it refers to and what you need to do to protect your business should BDR be right for you.

Spoiler alert: it very much is.

0 Comments
Continue reading

Professional Services IT Has Come a Long Way

Professional Services IT Has Come a Long Way

Professional services make up a significant portion of the business landscape. They can be broadly defined as any organization with trained professionals at the center offering a service of note. The most common professionals under this umbrella term are lawyers, agents, consultants, and others who help businesses in their day-to-day operations. Let’s explore some of the technology that fuels professional service providers.

0 Comments
Continue reading

Tip of the Week: Creating Google Forms that Auto-Populate Google Sheets

Tip of the Week: Creating Google Forms that Auto-Populate Google Sheets

There are several reasons to use a form to collect data for your business, from customer impressions and service needs to employee feedback about internal matters as a means of collaborative decision-making. The trouble comes when it is time to compile all the responses… unless you know how to use the tools at your disposal.

For this week’s tip, we’re walking through the process of creating a form that self-populates a spreadsheet using Google’s toolkit.

0 Comments
Continue reading

Opportunity Cost, Return on Investment, and Saving Money with Technology

Opportunity Cost, Return on Investment, and Saving Money with Technology

Part of doing business is understanding certain types of trade-offs related to the decisions you make. Specifically, we want to highlight opportunity cost as it relates to technology. What is the opportunity cost of technology, and why is it an important concept for a business owner to grasp?

0 Comments
Continue reading

Some of the Best Practices for Internal File Sharing

Some of the Best Practices for Internal File Sharing

Ensuring that your organization's file-sharing policies and procedures are built to enhance security can significantly impact collaboration, distinguishing between efficient, streamlined processes and time-purging, wasteful practices. Navigating this terrain can be a challenge. Let’s explore several best practices your organization can adopt to optimize file-sharing.

0 Comments
Continue reading

How to Keep Engagement Up (Even in a Remote or Hybrid Workplace)

How to Keep Engagement Up (Even in a Remote or Hybrid Workplace)

Remote and hybrid work models have become more popular than ever, in no small part thanks to the improved technology businesses of all sizes can now access. Nevertheless, this shift has brought new challenges for organizations everywhere. One such challenge is maintaining and enhancing remote workplace engagement—a crucial aspect that directly impacts employee satisfaction, productivity, and retention.

0 Comments
Continue reading
Request a Consultation

Jackson Thornton Technologies strives to provide the best comprehensive IT, Computer, and Networking services to small businesses. We can handle all of your organization's technology challenges.

Contact Us
Contact Us

Learn more about what Jackson Thornton Technologies can do for your business.

200 Commerce Street ,
Montgomery, Alabama 36104

Call us: (877) 226-9091

News & Updates
Jackson Thornton Technologies (JTT) is pleased to announce its expansion to a third office located in Auburn, Alabama. This new office will allow JTT to provide additional services in the East Alabama market including cybersecurity reviews, training ...