Cyber Security

Stay up to date with the latest cyber crime trends, how cyber criminals are evolving and how to protect your business with cyber security. Learn the latest strategies, processes and tools to keep cyber criminals out and you and your employees in.

File Sharing Dangers and Best Practices

Best Practices to Avoid File Sharing Dangers

By Josh Rees | October 27, 2022

File sharing has long been a way to socialize with friends and family, especially sharing a photo of a sweet moment or memory. Everyone does it, whether on social media,…

Read More
Top Mobile Threats and Mobile Security Tips

Top Mobile Threats for You to Watch

By Dave Hatter | October 20, 2022

Who would have thought that smartphones and tablets would become the preferred communication device for both personal and business use? It’s a rhetorical question to be sure, but it raises…

Read More
Matanbuchus Malware Attack Uses Google Drive

Matanbuchus Malware Uses Google Drive Link in Phishing Attack

By Dave Hatter | October 4, 2022

Matanbuchus Malware Uses Google Drive Link in Phishing Attack You’ve probably never heard of Matanbuchus malware but you need to know about it and how it is using Google Drive…

Read More
How to stop unwanted emails.

How To Stop Unwanted Emails

By Tim Rettig | September 1, 2022

We all receive those pesky spam emails that crowd your inbox and make it difficult to organize. They can be newsletters from companies you may have signed up for and…

Read More
Insider Threat Indicators and Prevention

Insider Threat Indicators and Prevention Tips

By Dave Hatter | August 24, 2022

We often think of cyber threats as coming from outside our company, or even from other countries — and that is often the case. However, there is another threat closer…

Read More
Cyber Attacks Rising

Cyber Attacks Are Rising, New Cyber Security Legislation

By Dave Hatter | August 11, 2022

The latest statistics from the Federal Bureau of Investigation (FBI) demonstrate that no industry is exempt from cyber attacks which are increasing in frequency and impact. Per the FBI, Business…

Read More
Virtual Vciso

What Is a VCISO and What’s the Benefit For Your Company?

By Intrust Man | July 28, 2022

Have you noticed your IT team wearing too many hats and stretched way too thin lately? Asking them to be cyber security experts on top of their other job responsibilities…

Read More
24/7 Endpoint Monitoring

Why You Need 24/7 Endpoint Monitoring

By Dave Hatter | July 21, 2022

Criminals are working around the clock. Your security  monitoring should, too. Cyber attacks most commonly take place during hours of the day when systems are not always being monitored: holidays,…

Read More
Ransomware Response Checklist Download 2022

Download the Ransomware Response Checklist 2022

By Dave Hatter | June 29, 2022

Would you know what to do if you fell victim to a ransomware attack? Download this free printable checklist. The Ransomware Response Checklist covers: Rapid response measures Analysis-based measures Business…

Read More
social media security image

Social Media Security: If You Connect, Protect IT

By Dave Hatter | May 5, 2022

So many of us connect to social media these days. Whether it’s to see photos of kids or grandkids who live on the other side of the country or it’s…

Read More