Category Archives: Security

What Two Data Points Are Vital to Disaster Recovery? (Hint: RTO & RPO)

What Two Data Points Are Vital to Disaster Recovery? (Hint: RTO & RPO)

Data is the lifeblood of the modern organization. No matter what sector you operate in, you’ll undoubtedly rely on a mixture of cloud-based applications, on-premises resources and other digital tools to perform tasks, serve clients and fuel the bottom line.  Because data is so intrinsic to today’s workplace, going offline can have huge, disastrous implications. […]

4 Ways to Mitigate the Risk of Being Impacted by a Supply Chain Breach

4 Ways to Mitigate the Risk of Being Impacted by a Supply Chain Breach

In the last 18 months, two high-profile supply chain cyber attacks have hit the headlines. First, the software company, SolarWinds, suffered a hack when attackers inserted malicious code into its software, allowing them to access thousands of customers’ data. Then there was the Kaseya attack, a similar story where hackers compromised the IT provider’s software […]

2022 Cybersecurity Predictions to Inform Your Security Upgrades

2022 Cybersecurity Predictions to Inform Your Security Upgrades

2021 was a record year for cyber attacks, with a cyber attack occurring every 11 seconds per day of the year. Some of the highest-profile data breaches include the Kaseya ransomware attack and Colonial Pipeline cyber attack.  While it tended to be large organizations that made the headlines, small and medium-sized businesses suffered too. Research indicates that […]

Bossware is All the Rage – Learn How to Use it Responsibly

Bossware is All the Rage - Learn How to Use it Responsibly

Over the last 18 months, a new activity monitoring tool to track employee productivity has taken the world by storm. It’s called bossware, and it’s pretty controversial.  Advocates of this solution say that bossware is excellent for monitoring employee productivity in the remote working world. On the other hand, critics call bossware an invasive piece […]

Guide to Auditing Privileged Accounts for Better Cloud Security

Guide to Auditing Privileged Accounts for Better Cloud Security

Gone are the days when employees would work from computers in the office. Now, work is mobile, hybrid, and even fully remote. Cloud applications – like Microsoft 365, Slack, and Trello – have become the backbone of employee productivity, facilitating collaboration and communication from a distance.  The cloud isn’t without its risks, particularly regarding privileged […]

Prepare for 6 New Phishing Trends That Can Impact Your 2022 Cybersecurity

Prepare for 6 New Phishing Trends That Can Impact Your 2022 Cybersecurity

One IT security problem that only ever seems to get worse is phishing. It’s the main method of conducting cyberattacks of all kinds and it continues to grow in volume. One reason we seem to always see more phishing attacks and not fewer is that large criminal organizations optimize the delivery of phishing and its […]

Use This Clever Acronym (SLAM) to Improve Your Team’s Phishing Awareness

Use This Clever Acronym (SLAM) to Improve Your Team's Phishing Awareness

Protecting your company from cyber threats can take a lot of different forms. There are local applications like firewalls and antivirus, as well as network protection like DNS and email filtering. One of the most important forms of cybersecurity is employee awareness training to identify phishing emails.  Phishing is the main driver in 90% of […]

Should You Use Sign-in With Facebook or Google (Pros & Cons)

Should You Use Sign-in With Facebook or Google (Pros & Cons)

Compromised credentials have now become the main cause of data breaches globally. They’re responsible for an average of 20% of all data breaches, with an average cost per breach of $4.37 million. One of the reasons for the rise in password compromise is because users have so many passwords to juggle that they often fall […]

How to Stay #CyberSmart With Tips for Cybersecurity Awareness Month

How to Stay #CyberSmart With Tips for Cybersecurity Awareness Month

October is the time we have fun putting up scary decorations of ghouls, ghosts, and skeletons, but it’s also when we turn our attention to something else that’s very scary and very real – malware, password theft, and data breaches. Welcome to Cybersecurity Awareness Month, a recognition put into place back in 2004, just as […]

Follow These Steps for a Smooth Deployment of MFA at Your Business

Follow These Steps for a Smooth Deployment of MFA at Your Business

Businesses that want to stay competitive and resilient need to have a robust cloud infrastructure. This means that most of their processes and data are available from anywhere. It also means that all that sensitive information is generally only being protected by employee passwords. Password compromise is the main cause of cloud data breaches. The […]