Category Archives: Security

Use This Clever Acronym (SLAM) to Improve Your Team’s Phishing Awareness

Use This Clever Acronym (SLAM) to Improve Your Team's Phishing Awareness

Protecting your company from cyber threats can take a lot of different forms. There are local applications like firewalls and antivirus, as well as network protection like DNS and email filtering. One of the most important forms of cybersecurity is employee awareness training to identify phishing emails.  Phishing is the main driver in 90% of […]

Should You Use Sign-in With Facebook or Google (Pros & Cons)

Should You Use Sign-in With Facebook or Google (Pros & Cons)

Compromised credentials have now become the main cause of data breaches globally. They’re responsible for an average of 20% of all data breaches, with an average cost per breach of $4.37 million. One of the reasons for the rise in password compromise is because users have so many passwords to juggle that they often fall […]

How to Stay #CyberSmart With Tips for Cybersecurity Awareness Month

How to Stay #CyberSmart With Tips for Cybersecurity Awareness Month

October is the time we have fun putting up scary decorations of ghouls, ghosts, and skeletons, but it’s also when we turn our attention to something else that’s very scary and very real – malware, password theft, and data breaches. Welcome to Cybersecurity Awareness Month, a recognition put into place back in 2004, just as […]

Follow These Steps for a Smooth Deployment of MFA at Your Business

Follow These Steps for a Smooth Deployment of MFA at Your Business

Businesses that want to stay competitive and resilient need to have a robust cloud infrastructure. This means that most of their processes and data are available from anywhere. It also means that all that sensitive information is generally only being protected by employee passwords. Password compromise is the main cause of cloud data breaches. The […]

How Ransomware as a Service (RaaS) Works & Why It’s So Dangerous

How Ransomware as a Service (RaaS) Works & Why It's So Dangerous

In 2020, we saw an unprecedented rise in cyberattacks of all types, especially ransomware. Ransomware attacks exploded with a 485% increase over the prior year. Ransomware is particularly devastating for a company because it spreads quickly and encrypts files throughout the network. In most cases, this brings an organization to a standstill and desperate to […]

How Can We Stop Cloud Jacking of SaaS Accounts?

How Can We Stop Cloud Jacking of SaaS Accounts?

The cloud has gone from a new concept to business as usual over the last decade. Cloud use makes sense for companies for a number of reasons, especially since the lockdowns of the pandemic. Working in the cloud allows businesses and their employees to work from anywhere and greatly improves a company’s business continuity and […]

Mobile Security Index 2021: What Do You Need to Know About Smartphone Risks?

Mobile Security Index 2021: What Do You Need to Know About Smartphone Risks?

The use of mobile phones at work has grown steadily as cloud tools have become more powerful and workforces have become more mobile. Mobile devices now comprise approximately 60% of the endpoints in organizations and take on about 80% of the workload. That may seem like it’s not possible but think of all the employees […]

What Should You Know About the Cyberattacks on Colonial Pipeline & a Major Global Meat Supplier?

What Should You Know About the Cyberattacks on Colonial Pipeline & a Major Global Meat Supplier?

You may have seen cybersecurity popping up more in your news feed lately. Possibly even in a recent segment on your local newscast. This is due to two major attacks that have far-reaching consequences. Many data, network, and email security professionals have seen this coming for a while. Hackers have been honing their skills, branching […]

Is Your Firmware In Danger? Learn Why Firmware Can Leave You at Risk

Is Your Firmware In Danger? Learn Why Firmware Can Leave You at Risk

Cybersecurity planning is often like hitting a moving target. Forms of attack are always changing and what may be a low priority today may be a new emerging attack vector tomorrow. Hackers are always scanning for the best opportunity for attack. So, the way things generally play out is that attackers find a new vulnerability, […]

What Should We Consider When Implementing Two-Factor Authentication?

What Should We Consider When Implementing Two-Factor Authentication?

Password security is an ongoing issue that many companies face. Even more so now that most data is being stored in the cloud, and businesses are using mostly cloud workflows. When you work in the cloud, all your data is as secure as your least secure account password. And people often aren’t using very strong passwords […]