Remote Workers Are Here to Stay! Important Tips

Exactly a year ago today, no one would’ve thought that this many people would be working from home. Yet, here we are. The numbers are truly astounding. In June, the estimate was that 42% of the United States’ labor force had transitioned to full-time at-home work. For a while, most of us thought it would only…

Read More

What is Penetration Testing?

Penetration testing is a security exercise where a cyber-security expert attempts to exploit vulnerabilities in your computer system. The purpose of penetration testing is to identify any weak spots in your system’s defenses in which attackers could take advantage. This is like a bank hiring someone to think like a burglar and try to break…

Read More

Is Your Organization Prepared For Top 2020 Cybersecurity Threats?

IT cybersecurity professionals have been challenged to the hilt through the first half of 2020. At the height of the pandemic, phishing attacks increased by upwards of 600% – all while executives made haste to move to the Cloud or increase their remote workforce infrastructure. Industry leaders have been so busy dealing with emergencies at…

Read More

Hackers Target Zoom Meetings for Cyberattacks

Zoom Scrambles to Address Cybersecurity Issues in Meeting Platform As the usage of Zoom has skyrocketed during the coronavirus outbreak, the company has had to respond quickly to security flaws and potential phishing attacks   As Zoom usage skyrockets around the world, so too do the opportunities to exploit users unfamiliar with the tool. The…

Read More

What Does $150K Ransomware Payment Say About Your Cybersecurity?

$150K Ransomware Payment A recent news piece published by Tech Republic highlights the discouraging reasons why too many businesses fall prey to hackers and pay ransoms for their digital property. Perhaps nothing adds insult to injury quite like someone burglarizing your organization and then making you pay for their crime. A recent $150,000 ransom paid…

Read More

What Is Two-Factor Authentication?

phone and glasses at computer keyboard

Protect Yourself – Use Two-Factor Authentication for Your Business Two-factor authentication is something every business should be using to protect themselves and their customers. You know the value of adding layers of security to your business – if you have a brick and mortar operation, you probably have a lot more than a simple lock…

Read More

Protect Your Team From Coronavirus Phishing

How to Protect Your Business From the Surge in Phishing Websites As the entire world is worrying about the coronavirus, cybercriminals are taking advantage of the global crisis to line their pockets. Google reports that there has been a 350% increase in phishing websites in the last two months alone. This threat is genuine, and…

Read More

Hackers Target Zoom Meetings For Cyber Attacks

Zoom Scrambles to Address Cybersecurity Issues in Meeting Platform The Zoom platform has increasingly has been the target of hackers exploiting the vast numbers of users working from home. As Zoom usage skyrockets around the world, so too do the opportunities to exploit users unfamiliar with the tool. According to MarketWatch, the company’s daily active user…

Read More

Modern Phishing Email and Article Headlines That Fool Even Tech Professionals

Phishing and headlines that fool tech professionals

Learn more about the kind of email phishing headlines that end up fooling the smartest tech professionals, and how you can better protect your business.   Any tech professional worth their salt understands the damage wrought by unsuspecting users clicking on links inside “phishing” emails. It’s not surprising when tech-challenged individuals end up getting sucked…

Read More