<img height="1" width="1" src="https://www.facebook.com/tr?id=3212881575388825&amp;ev=PageView &amp;noscript=1">

Ransomware via MSP: Questions to Ask Your IT Services Firm

The year 2019 saw a huge uptick in the number of cases where managed service providers (MSPs) were infiltrated by criminals. We’re aware of a half-dozen…

The SOCBOX Team's Tips for Managing a Remote Workforce

Anybody else feel like they’re living on video conferences now? Since COVID-19 hit the United States, many businesses are transitioning to remote work—us…

Work-From-Home Checklist: Essentials for Enabling Remote Workers

In response to current events, many businesses are rushing to make provisions for allowing employees to work from home. We’ve put together this checklist…

What Does CCPA Mean for Smaller Businesses?

On January 1 of this year, the California Consumer Privacy Act (CCPA) took effect. The law gives consumers new rights to know—and in some cases, to…

Penetration Testing: Why It’s Important for Law Firms

Law firms are a major target for criminals. As a result, a security precaution known as penetration testing (pen testing for short) is advisable for legal…

Group Policy Objects: Stopping Ransomware Attacks in Their Tracks

Hardly a week goes by without news that some company, municipality or other organization has been hit with a ransomware attack. In an instant, critical…

Looking for MDR Services? 3 Components of a Complete Solution

Managed detection and response (MDR) is a fairly new category of security offering that has just taken hold over the last few years. We’ve written this…

SIEM vs. Network Traffic Analyzer: Which is Best for Security Monitoring?

To do their work protecting against criminal attacks, security teams need visibility into what’s happening in the network environment. This monitoring…

The Danger of Using Legacy Protocols for Business Email

Criminals attempt to compromise business email accounts more often than you may think. When they succeed, large amounts of money can disappear. Generally,…

How Your Law Firm Should Handle Data Privacy

More and more, law firms are receiving inquiries from potential clients about how the firm protects data privacy. These prospects are usually large…