Access Control Security 101
The next time you walk around the office, look at it with fresh eyes.
Important Cybersecurity Terms
You may have noticed that technology folks speak quickly and use acronyms almost constantly. What can I say? It’s probably all the caffeine. But if you come across a new term now and then, it’s not just you. Cybersecurity is constantly evolving, so even IT pros will run across a …
Vendor Due Diligence: 101
When many IT pros think about cybersecurity, they tend to focus on potential risks within their organization’s systems, software, and staff. But even if your business has excellent cybersecurity hygiene, that may not be enough to prevent a costly data breach or other forms of cyb…
Top Small Business Cyberattack Vulnerabilities
Is your small business protected from cyberattacks? If you have to ask, the answer is probably no. Too many small business owners still assume that their organization won’t be a target of cybercrime. But small businesses actually are highly vulnerable to cybercriminals, and it’s…
This New Social Engineering Scam “Fattens You Up” Before the Slaughter
One of the most disgusting aspects of cybercrime is just how easy it is for criminals to make a killing from it.
Ransomware — A Top Small Business Security Vulnerability
If your business hasn’t yet experienced a ransomware attack, but you aren’t actively preventing one, you’ve been very lucky. But luck has a way of running out.
How to Improve Your Cybersecurity Posture in 2023
While the supply chain is loosening, and other acute side-effects of the pandemic continue to subside in most parts of the world, cybercrime will continue to escalate in terms of frequency and severity.
Key Patches in November 2022 Microsoft Updates
It’s always tempting to put off some updates and patches, and we cybersecurity folks understand why. Sometimes they have unintended consequences that can interrupt workflow. Those little bugs are typically resolved eventually, but in the meantime, Microsoft’s problems will be you…
Everything You Need to Know About QR Code Phishing Scams
Thanks to QR codes, now when you go to many restaurants, you can use your smartphone to place an order. You don’t have to touch a potentially germy, food-smeared menu, and restaurants don’t have to keep producing and distributing them.
Your Guide to Business IT Security Policies
Cybercrime is now more profitable than the illegal drug trade, but that’s only because many businesses aren’t following cybersecurity best practices. Most cybercriminals are looking for a fast profit, and if their ability to make easy millions were to be suddenly taken away from …