What is Business Email Compromise?
You don’t have to be a victim of Business Email Compromise. Find out how you can prevent the most common BEC attacks.
What is Business Email Compromise? Read More »
You don’t have to be a victim of Business Email Compromise. Find out how you can prevent the most common BEC attacks.
What is Business Email Compromise? Read More »
Is your company Security Aware? What steps should be taken to avoid a cyber attack?
What is security awareness? Read More »
Ever wondered what is involved in a ransomware attack? In this post, we will explore what makes up a successful ransomware attack.
Anatomy of a Ransomware attack Read More »
Here are 15 ways your company can take to protect from a ransomware attack.
15 Ways to Protect Your Business from a Cyberattack Read More »
You can’t go a day without some report of a newly discovered security vulnerability or a ransomware attack. We’ve all done it. We search the web for free anti-virus and download and install some software, and then convince ourselves that we are protected. We then operate under the illusion that we are too small of a company for hackers to bother with. We aren’t the Capital Ones, or the Targets of the world, so hackers will look past us right? Wrong.
Why you need Managed Detection and Response Read More »
In case you weren’t able to attend our Virtual Event, enjoy the hightlights.
Virtual Event Recap Read More »
Secure your Spot. Attendees have a chance to win a pair of Apple Air Pods
Free Virtual Event Read More »
Your name, address, and information live as much on the internet as they do in a physical sense. If you perform any of the following online activities, you can be sure your information is out there: Email, Social Media, Online Shopping, Games, News, Forums. Many major platforms such as Linked In have suffered data breaches. At the very least your name, email address and password were extracted. To see if your information was leaked, you can do a self-check at haveibeenpwnd.com
What harm can someone do with my online identity? Read More »
Today we are going to delve into a topic that’s on everybody’s mind. Maybe you’re afraid to ask, because you won’t like the answer. Or perhaps you feel like you’re protected so why tip over the apple cart?
Since we sometimes like stirring up the hornet’s nest, we are going to examine how secure your remote workers really are. Are your employees protected from the latest cyber security threats? Do you have to worry about ransomware or viruses? Should you be using a VPN? These are some of the questions we will dig deeper into.
Are My Remote Workers Protected from Cyber Security Threats? Read More »
We’ve all been there. You get a new phone, and in your excitement, you overlook moving all your contacts and your data. Most of the time you don’t realize this until you’ve already sent in your phone. If you use a third-party application to back up your data you may be able to get it back, but if not, your data is just gone.
Things to do before ditching your old phone system Read More »