Seventh Wall Resources

All Resources
Articles
Case Studies

Every year the FBI compiles stats on malware and ransomware.  It’s a long report and I’ve linked to it at the bottom of this blog, but to make things easy, I cut out some interesting graphs that I’ll add below.  I think…

Overview Charlottesville Gastroenterology & Associates, a leading medical practice, faced the daunting challenge of overhauling their antiquated IT infrastructure. In partnership with Seventh Wall, they embarked on a journey to not only revitalize their systems but to restore their faith in the…

Overview At its founding, ICE Global Consulting envisioned a future of unprecedented growth, necessitating a robust IT backbone. In this pursuit, Seventh Wall was engaged from the outset to craft an IT infrastructure that was both scalable and resilient, capitalizing on an…

Humanity has been taught incorrectly about passwords. We’ve all heard the old standard for a “good” password: 8 characters with upper/lower case + numbers + special characters. This standard is actually EASY for computers to crack and HARD for people to remember. When it…

‍Summary Vulnerabilities, AKA “risks to your business” are often moving targets Vulnerability assessments illuminate these hidden risks Regular assessments are good because they allow for small fixes and maintenance-like tasks to be completed to keep your business safe. Regularity is preferable to…

Setting Sail in the Cyber Seas Before embarking on any journey, one must understand the route. Similarly, understanding cybersecurity regulations is a crucial first step for any company. These laws aim to protect companies and their clients from potential cyber threats. However,…

Every year the FBI compiles stats on malware and ransomware.  It’s a long report and I’ve linked to it at the bottom of this blog, but to make things easy, I cut out some interesting graphs that I’ll add below.  I think…

Humanity has been taught incorrectly about passwords. We’ve all heard the old standard for a “good” password: 8 characters with upper/lower case + numbers + special characters. This standard is actually EASY for computers to crack and HARD for people to remember. When it…

‍Summary Vulnerabilities, AKA “risks to your business” are often moving targets Vulnerability assessments illuminate these hidden risks Regular assessments are good because they allow for small fixes and maintenance-like tasks to be completed to keep your business safe. Regularity is preferable to…

Setting Sail in the Cyber Seas Before embarking on any journey, one must understand the route. Similarly, understanding cybersecurity regulations is a crucial first step for any company. These laws aim to protect companies and their clients from potential cyber threats. However,…

Hook, Line, and Sinker The digital age, while teeming with advancements and opportunities, also opens the floodgates to new forms of security risks and cyber threats. Among the most prominent of these threats is phishing. Unfortunately, phishing is not about the thrill…

Opening Pandora’s Box: Understanding the Basics Firstly, it’s important to note that MFA is THE SINGLE MOST IMPORTANT SECURITY MEASURE THAT YOU CAN SETUP.  And it’s relatively simple and usually free! Let’s begin by unlocking the Pandora’s box of the very basics…

Overview Charlottesville Gastroenterology & Associates, a leading medical practice, faced the daunting challenge of overhauling their antiquated IT infrastructure. In partnership with Seventh Wall, they embarked on a journey to not only revitalize their systems but to restore their faith in the…

Overview At its founding, ICE Global Consulting envisioned a future of unprecedented growth, necessitating a robust IT backbone. In this pursuit, Seventh Wall was engaged from the outset to craft an IT infrastructure that was both scalable and resilient, capitalizing on an…