Stay up to date with the latest cyber crime trends, how cyber criminals are evolving and how to protect your business with cyber security. Learn the latest strategies, processes and tools to keep cyber criminals out and you and your employees in.
Best Practices to Avoid File Sharing Dangers
File sharing has long been a way to socialize with friends and family, especially sharing a photo of a sweet moment or memory. Everyone does it, whether on social media,…
Read MoreTop Mobile Threats for You to Watch
Who would have thought that smartphones and tablets would become the preferred communication device for both personal and business use? It’s a rhetorical question to be sure, but it raises…
Read MoreMatanbuchus Malware Uses Google Drive Link in Phishing Attack
Matanbuchus Malware Uses Google Drive Link in Phishing Attack You’ve probably never heard of Matanbuchus malware but you need to know about it and how it is using Google Drive…
Read MoreHow To Stop Unwanted Emails
We all receive those pesky spam emails that crowd your inbox and make it difficult to organize. They can be newsletters from companies you may have signed up for and…
Read MoreInsider Threat Indicators and Prevention Tips
We often think of cyber threats as coming from outside our company, or even from other countries — and that is often the case. However, there is another threat closer…
Read MoreCyber Attacks Are Rising, New Cyber Security Legislation
The latest statistics from the Federal Bureau of Investigation (FBI) demonstrate that no industry is exempt from cyber attacks which are increasing in frequency and impact. Per the FBI, Business…
Read MoreWhat Is a VCISO and What’s the Benefit For Your Company?
Have you noticed your IT team wearing too many hats and stretched way too thin lately? Asking them to be cyber security experts on top of their other job responsibilities…
Read MoreWhy You Need 24/7 Endpoint Monitoring
Criminals are working around the clock. Your security monitoring should, too. Cyber attacks most commonly take place during hours of the day when systems are not always being monitored: holidays,…
Read MoreDownload the Ransomware Response Checklist 2022
Would you know what to do if you fell victim to a ransomware attack? Download this free printable checklist. The Ransomware Response Checklist covers: This simple one-pager is a great…
Read MoreSocial Media Security: If You Connect, Protect IT
So many of us connect to social media these days. Whether it’s to see photos of kids or grandkids who live on the other side of the country or it’s…
Read More