Posts Tagged ‘Featured’
Matanbuchus Malware Uses Google Drive Link in Phishing Attack
Matanbuchus Malware Uses Google Drive Link in Phishing Attack You’ve probably never heard of Matanbuchus malware but you need to know about it and how it is using Google Drive and other legitimate infrastures to worm its way into your network. This cyber security risk first surfaced in February 2021, but recently, a cyber criminal…
Read MoreThe Shared Responsibility Model & Microsoft 365
The shared responsibility model. You may have heard of it, but do you know what it is or what it means for your business? Before we jump in, there are a few things that you need to understand about your cyber security. With more and more businesses using cloud services like Microsoft 365 (MS 365),…
Read MoreHow To Stop Unwanted Emails
We all receive those pesky spam emails that crowd your inbox and make it difficult to organize. They can be newsletters from companies you may have signed up for and no longer want, spam mail, or even phishing emails sent by scammers trying to access your information. No matter the type, you can stop unwanted…
Read MorePrevent Phishing With The SLAM Technique
Phishing has become the top method cyber criminals use to attack companies, whether that’s hitting them with ransomware, breaching their databases, stealing their credentials and more. It is one of the biggest cyber security threats to companies, so it’s crucial they learn methods of phishing detection. What is Phishing? Phishing is a social engineering tactic…
Read MoreA Leader’s Guide to Creating a Foolproof Business Continuity Plan (and Why It’s Important)
Are you ready for a crisis? Fire, flood, breach, ransom? If your business has been running smoothly, you might think you don’t need a continuity plan. You’ve been lucky. Most companies have had some sort of disruption that prohibits working. Those who have experienced disasters already know the benefit of having a continuity plan in…
Read MoreWhat Is a VCISO and What’s the Benefit For Your Company?
Have you noticed your IT team wearing too many hats and stretched way too thin lately? Asking them to be cyber security experts on top of their other job responsibilities can be overwhelming for them and risky for your organization. Cyber security is a specialized and rapidly changing field and the bad guys never rest.…
Read MoreWhy You Need 24/7 Endpoint Monitoring
Criminals are working around the clock. Your security monitoring should, too. Cyber attacks most commonly take place during hours of the day when systems are not always being monitored: holidays, weekends and overnight. That’s why it’s important to have 24/7 endpoint monitoring so that you’re covered, from your networks and servers all the way down…
Read MoreIn House, Co-Managed or Hybrid: New Models For Outsourcing IT Support
You know you need better IT but you don’t know the best way to get it: Hire in-house or outsourcing IT support with a managed service provider (MSP)? Why not choose both with a co-managed or hybrid plan. For some companies small and large, co-managed service provides the best of both worlds. Some of the…
Read MoreSocial Media Security: If You Connect, Protect IT
So many of us connect to social media these days. Whether it’s to see photos of kids or grandkids who live on the other side of the country or it’s because we like to keep a pulse on health hints or even the latest jokes. But you might also be putting your cyber security at…
Read MoreBusiness Continuity: Create a Plan in 5 Steps
Whether your business is teeny weeny or gigantic in size, leading it is a challenging job, especially in the current environment. As part of an overall disaster recovery plan, you need to know how to quickly respond and resolve any crisis, from tornadoes, flood, snow or fire damage to a cyber security breach. The ideal…
Read More