888-448-5451 [email protected]
Protect against phishing attacks involving file sharing programs

Protect against phishing attacks involving file sharing programs

Phishing attacks are an all-too-common occurrence in today’s business world. Hackers use phishing scams to trick employees into giving up company information, passwords and other sensitive data. The phishers often send out emails that appear as if they come from the CEO or another high-level exec…

Make your remote workforce safer with cyber awareness training and micro-learning

Make your remote workforce safer with cyber awareness training and micro-learning

It seems that every day, our work environment continues to get more dependent on technology. For example, just take a look at your office computer screen and notice all the apps you need to run your job from one central location.  As more employees find themselves working remotely, and with such easy access to information utilizing the Internet from home, cyberattacks have become a major concern.

The Executive Order on improving cybersecurity

The Executive Order on improving cybersecurity

The Executive Order (EO) on improving the nation’s cybersecurity to support public and private efforts, will help identify, deter, protect against, detect, and respond to persistent and increasingly sophisticated malicious cyber campaigns. What has influenced some of the specific measures used in the Executive Order are the recent cyber espionage campaigns.

Cyber Resilience: How to plan for the unknown

Cyber Resilience: How to plan for the unknown

Cyber resilience gets businesses to prepare for, respond to, and recover from cyber threats. For it to work you want your IT and security teams to have actionable data on everything in the network, not just the devices and applications that employees use every day.  To set this up you need to plan up-front and have model scenarios that can tell you how your data would be accessed.   

How to improve cloud security and third-party risk management

How to improve cloud security and third-party risk management

The Equifax data breach of 143 million US consumers is a clear example that cybersecurity threats are real, and that the stakes for businesses have never been higher. When risks don’t get addressed immediately, this makes it even more likely to become another Equifax breach, or think of the SolarWinds incident.  All cyber-attacks are damaging to people and the business that gets hit.