Technology Insights Blog: Security

Why You Should Invest in Email Protection

By: Jay Brown
February 28, 2023

In films, cybercriminals are primarily depicted as some sort of genius-level keyboard ninjas, feverishly typing away and sending out a string of attacks in real-time to paralyze an organization or combat another hacker. In reality, most cybercrime is far more mundane, and sadly, …

Read the Full Story

This New Social Engineering Scam “Fattens You Up” Before the Slaughter

By: Jon Roberts
February 20, 2023

One of the most disgusting aspects of cybercrime is just how easy it is for criminals to make a killing from it. 

Read the Full Story

Ransomware — A Top Small Business Security Vulnerability

By: Jon Roberts
February 8, 2023

If your business hasn’t yet experienced a ransomware attack, but you aren’t actively preventing one, you’ve been very lucky.  But luck has a way of running out. 

Read the Full Story

How to Improve Your Cybersecurity Posture in 2023

By: Mike Burgard
January 16, 2023

While the supply chain is loosening, and other acute side-effects of the pandemic continue to subside in most parts of the world, cybercrime will continue to escalate in terms of frequency and severity. 

Read the Full Story

Key Patches in November 2022 Microsoft Updates

By: Mike Burgard
December 22, 2022

It’s always tempting to put off some updates and patches, and we cybersecurity folks understand why. Sometimes they have unintended consequences that can interrupt workflow. Those little bugs are typically resolved eventually, but in the meantime, Microsoft’s problems will be you…

Read the Full Story

Everything You Need to Know About QR Code Phishing Scams

By: Marco
December 19, 2022

Thanks to QR codes, now when you go to many restaurants, you can use your smartphone to place an order. You don’t have to touch a potentially germy, food-smeared menu, and restaurants don’t have to keep producing and distributing them.

Read the Full Story

Your Guide to Business IT Security Policies

By: Mike Burgard
December 5, 2022

Cybercrime is now more profitable than the illegal drug trade, but that’s only because many businesses aren’t following cybersecurity best practices. Most cybercriminals are looking for a fast profit, and if their ability to make easy millions were to be suddenly taken away from …

Read the Full Story

Deadline Extended, but Still Approaching, for the Revised FTC Safeguards Rule

By: Jay Brown
November 10, 2022

In 1999 Congress passed the Gramm-Leach-Billey Act (GBLA) to protect consumer privacy and financial data and outlaw deceptive practices. The act has three sections: the Financial Privacy Rule, the Safeguard Rule, and the Pretexting Rule, and it applies to any institution that off…

Read the Full Story

What Is a SOC Report and Why Is it Important?

By: Jennifer Hemmah
November 7, 2022

A System and Organization Controls (SOC) report serves as third-party verification that a company is consistently following best practices. The reports follow the Statement on Standards for Attestation (SSAE) 18 requirements set out by the American Institute of Certified Public A…

Read the Full Story

Why Companies Are Adopting Zero Trust Architecture

By: Mike Burgard
September 30, 2022

You may be hearing the term "zero trust" more often these days. Though the concept has been around for years, it’s gained more traction since the mass migration of employees working remotely.

Read the Full Story
Subscribe to Our Blog