Cyber Security

Stay up to date with the latest cyber crime trends, how cyber criminals are evolving and how to protect your business with cyber security. Learn the latest strategies, processes and tools to keep cyber criminals out and you and your employees in.

LastPass Incident and Intrust’s Recommendation

By Dave Hatter | January 3, 2023

We’ve been advocating for and using password manager software for many years. After extensive testing, we landed on LastPass several years ago for its advanced security capabilities, ease of use…

Read More

Best Practices to Prevent Phishing Attacks

By Dave Hatter | December 15, 2022

No cybersecurity techniques can prevent phishing or other types of cyber attacks if the end user doesn’t know best how to spot and prevent phishing attacks. That’s why training is…

Read More
Email Security Trends

Email Security Trends and Preventing Email-Borne Cyber Attacks

By Dave Hatter | December 8, 2022

There’s a  good reason we talk about email security trends a lot in this blog and with our managed IT clients. In the past couple of years, cyber attacks by…

Read More

7 Business Cyber Security Tips for the Holidays

By Dave Hatter | December 1, 2022

The holidays are a time of giving, but for hackers, it’s a prime opportunity to steal data and money. Companies are the most susceptible to these nefarious attacks, especially if…

Read More
supply chain cyber attacks

Supply Chain Cyber Attacks Are On the Rise: How To Protect Your Company

By Dave Hatter | November 3, 2022

When it comes to cyber security, things are always changing, and technology is always growing or improving in one way or another. As a result of this, cyber attacks have…

Read More
File Sharing Dangers and Best Practices

Best Practices to Avoid File Sharing Dangers

By Josh Rees | October 27, 2022

File sharing has long been a way to socialize with friends and family, especially sharing a photo of a sweet moment or memory. Everyone does it, whether on social media,…

Read More
Top Mobile Threats and Mobile Security Tips

Top Mobile Threats for You to Watch

By Dave Hatter | October 20, 2022

Who would have thought that smartphones and tablets would become the preferred communication device for both personal and business use? It’s a rhetorical question to be sure, but it raises…

Read More
Matanbuchus Malware Attack Uses Google Drive

Matanbuchus Malware Uses Google Drive Link in Phishing Attack

By Dave Hatter | October 4, 2022

Matanbuchus Malware Uses Google Drive Link in Phishing Attack You’ve probably never heard of Matanbuchus malware but you need to know about it and how it is using Google Drive…

Read More
How to stop unwanted emails.

How To Stop Unwanted Emails

By Tim Rettig | September 1, 2022

We all receive those pesky spam emails that crowd your inbox and make it difficult to organize. They can be newsletters from companies you may have signed up for and…

Read More
Insider Threat Indicators and Prevention

Insider Threat Indicators and Prevention Tips

By Dave Hatter | August 24, 2022

We often think of cyber threats as coming from outside our company, or even from other countries — and that is often the case. However, there is another threat closer…

Read More