Technology Insights Blog: Security

What is a SOC Report and Why is it Important?

By: Jennifer Hemmah
November 7, 2022

A System and Organization Controls (SOC) report serves as third-party verification that a company is consistently following best practices. The reports follow the Statement on Standards for Attestation (SSAE) 18 requirements set out by the American Institute of Certified Public A…

Read the Full Story

Why Companies Are Adopting Zero Trust Architecture

By: Mike Burgard
September 30, 2022

You may be hearing the term "zero trust" more often these days. Though the concept has been around for years, it’s gained more traction since the mass migration of employees working remotely.

Read the Full Story

Are VPNs Obsolete Technology?

By: Jon Roberts
September 23, 2022

Too soon? You might have guessed that if this question is being asked by tech pros, the answer is probably yes. I recognize this might be unwelcome news for many. A VPN, or Virtual Private Network, looked like the clear choice for a lot of companies looking to accommodate hybrid …

Read the Full Story

13 Email Security Threats Your Business Needs to Know About

By: Marco
September 16, 2022

Barracuda, a leader in email protection, application and cloud security, network security and data protection, has recently compiled a comprehensive eBook outlining the 13 email threat types that currently threaten organizations worldwide. These common attacks are listed in order…

Read the Full Story

KnowBe4's 2022 Phishing By Industry Report

By: Marco
September 14, 2022

There are many different kinds of cyberattacks, but 91% of them begin the same way — with a simple spear phishing email. Phishing scams pose a significant threat to organizations of every size. Despite this, roughly 20% of workplaces only deliver phishing awareness training to th…

Read the Full Story

Everything You Should Know About the Cybersecurity and Infrastructure Security Agency

By: Mike Burgard
August 22, 2022

Have you updated the software on your Apple device lately? If not, look for any new software updates and install them…now. While your new software is downloading, I’ll explain what this update is for and why it’s important to install new software updates as soon as they’re availa…

Read the Full Story

What You Need to Know About Recent Apple Updates for Vulnerability

By: Jon Roberts
August 22, 2022

Have you updated the software on your Apple device lately? If not, look for any new software updates and install them…now. While your new software is downloading, I’ll explain what this update is for and why it’s important to install new software updates as soon as they’re availa…

Read the Full Story

What Is Your Incident Response Plan?

By: Jon Roberts
August 10, 2022

What is your Incident Response Plan? An Incident Response Plan (IRP) should contain everything your organization will do in the event of a security incident. A Disaster Recovery Plan (DRP) and an IRP are essential components of a Business Continuity Plan (BCP).

Read the Full Story

How Layers of Cybersecurity Can Protect Your Business

By: Marco
August 1, 2022

The National Institute of Standards and Technology (NIST) defines Defense-in-Depth (DID) as “An information security strategy that integrates people, technology, and operations capabilities to establish variable barriers across multiple layers and missions of the organization.” H…

Read the Full Story

Why You Should Invest in Email Protection

By: Jay Brown
July 29, 2022

In films, cybercriminals are primarily depicted as some sort of genius-level keyboard ninjas, feverishly typing away and sending out a string of attacks in real-time to paralyze an organization or combat another hacker. In reality, most cybercrime is far more mundane, and sadly, …

Read the Full Story
Previous
Subscribe to Our Blog