Why You Should Invest in Email Protection
In films, cybercriminals are primarily depicted as some sort of genius-level keyboard ninjas, feverishly typing away and sending out a string of attacks in real-time to paralyze an organization or combat another hacker. In reality, most cybercrime is far more mundane, and sadly, …
This New Social Engineering Scam “Fattens You Up” Before the Slaughter
One of the most disgusting aspects of cybercrime is just how easy it is for criminals to make a killing from it.
Ransomware — A Top Small Business Security Vulnerability
If your business hasn’t yet experienced a ransomware attack, but you aren’t actively preventing one, you’ve been very lucky. But luck has a way of running out.
How to Improve Your Cybersecurity Posture in 2023
While the supply chain is loosening, and other acute side-effects of the pandemic continue to subside in most parts of the world, cybercrime will continue to escalate in terms of frequency and severity.
Key Patches in November 2022 Microsoft Updates
It’s always tempting to put off some updates and patches, and we cybersecurity folks understand why. Sometimes they have unintended consequences that can interrupt workflow. Those little bugs are typically resolved eventually, but in the meantime, Microsoft’s problems will be you…
Everything You Need to Know About QR Code Phishing Scams
Thanks to QR codes, now when you go to many restaurants, you can use your smartphone to place an order. You don’t have to touch a potentially germy, food-smeared menu, and restaurants don’t have to keep producing and distributing them.
Your Guide to Business IT Security Policies
Cybercrime is now more profitable than the illegal drug trade, but that’s only because many businesses aren’t following cybersecurity best practices. Most cybercriminals are looking for a fast profit, and if their ability to make easy millions were to be suddenly taken away from …
Deadline Extended, but Still Approaching, for the Revised FTC Safeguards Rule
In 1999 Congress passed the Gramm-Leach-Billey Act (GBLA) to protect consumer privacy and financial data and outlaw deceptive practices. The act has three sections: the Financial Privacy Rule, the Safeguard Rule, and the Pretexting Rule, and it applies to any institution that off…
What Is a SOC Report and Why Is it Important?
A System and Organization Controls (SOC) report serves as third-party verification that a company is consistently following best practices. The reports follow the Statement on Standards for Attestation (SSAE) 18 requirements set out by the American Institute of Certified Public A…
Why Companies Are Adopting Zero Trust Architecture
You may be hearing the term "zero trust" more often these days. Though the concept has been around for years, it’s gained more traction since the mass migration of employees working remotely.