Everything You Need To Know About QR Code Phishing Scams
Thanks to QR codes, now when you go to many restaurants, you can use your smartphone to place an order. You don’t have to touch a potentially germy, food-smeared menu, and restaurants don’t have to keep producing and distributing them.
Your Guide to Business IT Security Policies
Cybercrime is now more profitable than the illegal drug trade, but that’s only because many businesses aren’t following cybersecurity best practices. Most cybercriminals are looking for a fast profit, and if their ability to make easy millions were to be suddenly taken away from …
Deadline Extended, but Still Approaching, for the Revised FTC Safeguards Rule
In 1999 Congress passed the Gramm-Leach-Billey Act (GBLA) to protect consumer privacy and financial data and outlaw deceptive practices. The act has three sections: the Financial Privacy Rule, the Safeguard Rule, and the Pretexting Rule, and it applies to any institution that off…
What Is a SOC Report and Why Is It Important?
A System and Organization Controls (SOC) report serves as third-party verification that a company is consistently following best practices. The reports follow the Statement on Standards for Attestation (SSAE) 18 requirements set out by the American Institute of Certified Public A…
Why Companies Are Adopting Zero Trust Architecture
You may be hearing the term "zero trust" more often these days. Though the concept has been around for years, it’s gained more traction since the mass migration of employees working remotely.
Are VPNs Obsolete Technology?
Too soon? You might have guessed that if this question is being asked by tech pros, the answer is probably yes. I recognize this might be unwelcome news for many. A VPN, or Virtual Private Network, looked like the clear choice for a lot of companies looking to accommodate hybrid …
13 Email Security Threats Your Business Needs To Know About
Barracuda, a leader in email protection, application and cloud security, network security and data protection, has recently compiled a comprehensive eBook outlining the 13 email threat types that currently threaten organizations worldwide. These common attacks are listed in order…
KnowBe4's 2022 Phishing By Industry Report
There are many different kinds of cyberattacks, but 91% of them begin the same way — with a simple spear phishing email. Phishing scams pose a significant threat to organizations of every size. Despite this, roughly 20% of workplaces only deliver phishing awareness training to th…
Everything You Should Know About the Cybersecurity and Infrastructure Security Agency
Have you updated the software on your Apple device lately? If not, look for any new software updates and install them…now. While your new software is downloading, I’ll explain what this update is for and why it’s important to install new software updates as soon as they’re availa…
What You Need To Know About Recent Apple Updates for Vulnerability
Have you updated the software on your Apple device lately? If not, look for any new software updates and install them…now. While your new software is downloading, I’ll explain what this update is for and why it’s important to install new software updates as soon as they’re availa…