December 9, 2017
Poor digital hygiene + rise in cyberattacks = need for cyber security training
Your business critical systems, applications, and data are under a constant state of threat. In fact, a recent Cybersecurity Ventures report finds that a ransomware attack occurs every 40 seconds—and by the end of 2019 an attack is projected to occur every 14 seconds. It’s clear that you need a vigilant army of end users...

Your business critical systems, applications, and data are under a constant state of threat. In fact, a recent Cybersecurity Ventures report finds that a ransomware attack occurs every 40 seconds—and by the end of 2019 an attack is projected to occur every 14 seconds. It’s clear that you need a vigilant army of end users…

Read
what to do when you've been infected by ransomware
November 30, 2017
What to do when you’ve been hit by ransomware – Your path to recovery
There it is—the ransomware lockscreen staring you down with its arrogant gaze, just begging you to cry, “Uncle!” So much for your pleasant morning cup of coffee. So, now what? What steps should you and your IT department take to mitigate the damage and restore your data? The answer is: It depends. Here are some...

There it is—the ransomware lockscreen staring you down with its arrogant gaze, just begging you to cry, “Uncle!” So much for your pleasant morning cup of coffee. So, now what? What steps should you and your IT department take to mitigate the damage and restore your data? The answer is: It depends. Here are some…

Read
November 16, 2017
The password security tips you need to keep your business data safe
It’s a never-ending battle: Hackers relentlessly look for a way into your digital house, you work overtime, boarding up the windows. Meanwhile, your employees stand in the threshold graciously offering their up their keys. We know employees are the primary cause of data breaches—and that login credentials are almost always employed at some phase of...

It’s a never-ending battle: Hackers relentlessly look for a way into your digital house, you work overtime, boarding up the windows. Meanwhile, your employees stand in the threshold graciously offering their up their keys. We know employees are the primary cause of data breaches—and that login credentials are almost always employed at some phase of…

Read
November 6, 2017
How to use WiFi safely as threats like KRACKS explode onto the scene
This month, a Grand Canyon-sized hole in WPA2 WiFi security protocol was discovered—and, it’s a vulnerability that has the potential to spell catastrophic consequences for organizations and their mobile workforces. So, what does the threat mean to you? And, more importantly, how can you use WiFi safely? Let’s dig in. KRACKS is a threat to...

This month, a Grand Canyon-sized hole in WPA2 WiFi security protocol was discovered—and, it’s a vulnerability that has the potential to spell catastrophic consequences for organizations and their mobile workforces. So, what does the threat mean to you? And, more importantly, how can you use WiFi safely? Let’s dig in. KRACKS is a threat to…

Read
November 2, 2017
These endpoint security best practices keep cybercriminals at bay
“We’ve been compromised.” Those three little words are sure to keep you tossing and turning at night. Maybe an unauthorized user has accessed your data. Perhaps you’ve discovered an end user’s screen being recorded. Maybe your critical business applications have been encrypted by ransomware. It’s the stuff of nightmares. So, how do you return to...

“We’ve been compromised.” Those three little words are sure to keep you tossing and turning at night. Maybe an unauthorized user has accessed your data. Perhaps you’ve discovered an end user’s screen being recorded. Maybe your critical business applications have been encrypted by ransomware. It’s the stuff of nightmares. So, how do you return to…

Read
October 6, 2017
Former Equifax CEO’s testimony reveals failures behind massive data security breach
Looking for a real-world example that underscores the critical importance of patching software? Equifax is it. According to the congressional testimony of former Equifax CEO, Richard F. Smith, a single individual within the company’s IT department failed to communicate an Apache Struts upgrade request—an upgrade that otherwise would have prevented the massive data breach. Smith...

Looking for a real-world example that underscores the critical importance of patching software? Equifax is it. According to the congressional testimony of former Equifax CEO, Richard F. Smith, a single individual within the company’s IT department failed to communicate an Apache Struts upgrade request—an upgrade that otherwise would have prevented the massive data breach. Smith…

Read