<img height="1" width="1" src="https://www.facebook.com/tr?id=3212881575388825&amp;ev=PageView &amp;noscript=1">

Confessions of a Social Engineer: Why You're Not As Safe As You Think

A recent Verizon study found that 33% of data breaches are caused by phishing or social engineering attacks. Why is social engineering so successful? It…

Recent Increase in Brute Force Attacks on RDP: How to Protect Your Data

Cybersecurity firm Kaspersky recently noted a significant increase in brute force attacks against those using remote access tools, especially Remote…

8 Cybersecurity Myths Debunked

Cybersecurity is often treated like the vitamin of the IT world: businesses know they should have it, but it’s easy to forget, and owners find it hard to…

COVID-19 Phishing Attacks: Safety Tips for Uncertain Times

Whenever there’s a big event with widespread awareness and human impact, it’s inevitable that online criminals will follow. It happens like clockwork…

3 Steps of the Security Incident Response Plan

When a security incident disrupts normal operations, the burst of activity can get hectic and confusing. Teams are trying to determine the cause, isolate…

Ransomware via MSP: Questions to Ask Your IT Services Firm

The year 2019 saw a huge uptick in the number of cases where managed service providers (MSPs) were infiltrated by criminals. We’re aware of a half-dozen…

Work-From-Home Checklist: Essentials for Enabling Remote Workers

In response to current events, many businesses are rushing to make provisions for allowing employees to work from home. We’ve put together this checklist…

What Does CCPA Mean for Smaller Businesses?

On January 1 of this year, the California Consumer Privacy Act (CCPA) took effect. The law gives consumers new rights to know—and in some cases, to…

Penetration Testing: Why It’s Important for Law Firms

Law firms are a major target for criminals. As a result, a security precaution known as penetration testing (pen testing for short) is advisable for legal…

Looking for MDR Services? 3 Components of a Complete Solution

Managed detection and response (MDR) is a fairly new category of security offering that has just taken hold over the last few years. We’ve written this…