Category

Internet Security
The importance of establishing strong cybersecurity systems within small to mid-sized companies increases every day. 60% of small businesses who are the victim of a cyber attack close their doors within six months. The U.S. Small Business Administration claims over 1/3rd of all cyber crimes target small to medium sized businesses. Those statistics have continued...
Read More
What is a VPN? Every time you access a website while browsing the internet your data must first go through your Internet Service Provider (ISP). They can log and track that data while seeing everything you do online. Some of these companies even sell that information to governments, advertisers, or other third parties.  A Virtual...
Read More
šŸŽ Tips for Safe Online Holiday shopping. šŸ› In 2018, 8% of consumers surveyed said they were victims of Identity theft during the holiday season. As black Friday approaches 56% of holiday shoppers plan to make purchases online in 2019. Before you shop this holiday season, we have prepared a list of cyber tips for...
Read More
Written by Ryan Stewart Attackers compromised Microsoft support agentā€™s credentials and gained access to view ā€˜limitedā€™ number of usersā€™ email account information.Upon learning about the incident, Microsoft immediately disabled the compromised support agent’s credentials. What is the issue – Microsoft notified its users via email that a certain ā€˜limitedā€™ number of users who use web email...
Read More
What does your company culture feel like? Do you work in a positive environment? Productivity begins with the employees of a corporation. If happiness is amongst the workforce, productivity and success increases. That is not a theory, judging by statistics, it is a fact. Company culture has changed as our generations have. I speak for...
Read More
Written by: Dan Shelton One of the most tragic things in the world of IT is when people adopt a new technology but donā€™t adopt a new way of working. The reason this is a problem is that almost every piece of enterprise software is much more than the application itself. Itā€™s also a mindset,...
Read More
Written by Damien Lewke of Crowdstrike Social engineering continues to be exploited by hackers and feared by security teams. Due to attackersā€™ subtlety and usersā€™ natural curiosity, hackers succeed daily in baiting users to click on a link or answer a phishing email. Ā Baiting is a highly successful technique that relies on an organizationā€™s weakest...
Read More
Written by: YogiĀ Chandiramani of Zscaler The internet is disrupting industries and business models, fundamentally changing the way we live and work in the process. The cloud has also ignited a wave of disruption, which when considered in conjunction with the proliferation of mobile devices, has rendered traditional network and security best practices obsolete. Indeed, as the...
Read More
Cybersecurity may seem like a foreign language to many executives and organizations who are not well versed on the subject. Despite how much you need cybersecurity, you donā€™t know what you donā€™t know. Do you have a strategy to minimize your risk? Are you seeking an expert to give your organization top tier cybersecurity direction?...
Read More
By Stan Lowe of Zscaler If thereā€™s one thing we can predict for certain for 2019, itā€™s that cyber criminals will continue to spin up more and more innovative ways to exploit gaps in security. The hackers have IoT devices on their radar, and theyā€™ll keep on looking to the cloud for new opportunities to...
Read More
1 2 3