Protect Against Cyber Threats With Best Practices
While police are cracking down on cybercrime, there are still billions of dollars to be made from ransomware and ot…
Print Security Report Reveals 6 Need-To-Know Stats
Watch out – Quocira’s annual report on the state of print security is out, and it is a stark reminder of the work n…
My Summary of Verizon’s 2024 Data Breach Investigations Report (DBIR)
The Verizon Data Breach Investigations Report (DBIR) has been published annually for the past 17 years. It provides…
CrowdStrike Global Outage
This morning, a faulty update from CrowdStrike caused systems to encounter a Blue Screen of Death (BSOD) error on W…
How To Use CIS Cybersecurity Controls To Protect Your Business
In a world where cybercriminals half a world away are preying upon small businesses and nonprofits day and night, i…
Business Fraud Prevention: 101
Nowadays, business fraud is a big business. According to Alloy’s 2024 State of Fraud Benchmark Report, 56% of surve…
Why Multi-Factor Authentication Is Important for Businesses
Passwords are a lot like keys. Some keys are better and more sophisticated than others, and a locked door is obviou…
What Are Honeypots and Honeytokens in Cybersecurity?
Companies these days are setting up multiple levels of defense in their cybersecurity programs, from advanced firew…
Meet the Marco Technology Assessment
Yes. We know — most “technology assessments” are very different. Ours isn’t just a simple scan, where we spit out a…