<img height="1" width="1" src="https://www.facebook.com/tr?id=3212881575388825&amp;ev=PageView &amp;noscript=1">

Work-From-Home Checklist: Essentials for Enabling Remote Workers

In response to current events, many businesses are rushing to make provisions for allowing employees to work from home. We’ve put together this checklist…

What Does CCPA Mean for Smaller Businesses?

On January 1 of this year, the California Consumer Privacy Act (CCPA) took effect. The law gives consumers new rights to know—and in some cases, to…

Penetration Testing: Why It’s Important for Law Firms

Law firms are a major target for criminals. As a result, a security precaution known as penetration testing (pen testing for short) is advisable for legal…

Group Policy Objects: Stopping Ransomware Attacks in Their Tracks

Hardly a week goes by without news that some company, municipality or other organization has been hit with a ransomware attack. In an instant, critical…

Looking for MDR Services? 3 Components of a Complete Solution

Managed detection and response (MDR) is a fairly new category of security offering that has just taken hold over the last few years. We’ve written this…

SIEM vs. Network Traffic Analyzer: Which is Best for Security Monitoring?

To do their work protecting against criminal attacks, security teams need visibility into what’s happening in the network environment. This monitoring…

The Danger of Using Legacy Protocols for Business Email

Criminals attempt to compromise business email accounts more often than you may think. When they succeed, large amounts of money can disappear. Generally,…

How Your Law Firm Should Handle Data Privacy

More and more, law firms are receiving inquiries from potential clients about how the firm protects data privacy. These prospects are usually large…

Why use Multi-Factor Authentication with Office 365?

Sometimes, a simple username and password isn’t enough to protect your information. Multi-Factor Authentication, or MFA, is a recommended security…

5 Reasons You Can’t Skimp on Cybersecurity Education

Your employees are your strongest line of defense…and your weakest link. The biggest risk to your organization’s cyber security posture is your employees,…