<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">
Skip to main content

Blog

Don’t Take the Bait: Phishing Attacks

Phishing is one of the most pervasive security threats today and it’s only getting worse Over the last few years, phishing attacks have continued to rise as attackers refine strategies, execute successful programs, and make money. Attackers are taking advantage of end users ...

Lather, Rinse, Repeat: How Automation Improves Customer Engagement

As businesses look to gain efficiencies, automation is gaining ground as a differentiator. For example, Robotic Process Automation helps organizations accelerate their digital transformations. The main value driver of automation is allowing top talent to do more ‘high ...

Work-from-Home Security: The Unspoken Cyber Impact of Coronavirus

Is your organization prepared to work from home due to the pandemic? Not just prepared for the change, but structurally prepared? Is your network designed to protect against the risks? For offices around the world, the possibility of having to send employees home ...

How serious is an incident? The Comprehensive Guide to Incident Response

What defines a cyber “incident”, and if it happens to your business, how serious is it? These are two prominent questions among businesses of all sizes and industries. These questions, however, are especially vital to answer for small businesses who often lack the staffing, ...

12 Consequences of a Cyber Incident

Trust us, we know that “getting hacked” seems scary enough on its own. However, there are additional consequences that go along with a breach or cyber incident that you should be aware of—including some you may not have realized.

Every Second Counts: 7 Steps to Take After a Cyberattack

Seconds matter when you’re detecting threats, and they’re even more vital when a threat becomes a successful cyberattack.

Avoid Costly Updates from Windows 7 and Windows 10 Blue Screen Errors

It’s been an eventful start to 2020 for Microsoft, including the end of Windows 7 and an update to Windows 10 that has left up to 900 million users in a buggy and turbulent state of affairs. In the wake of Windows 7, Microsoft has started sending strongly worded, ...

Complying with the SHIELD Act: Cybersecurity Requirements for Businesses

New York's SHIELD Act applies to businesses nationwide, with compliance required for anyone who does business with or holds personally identifiable information (PII) of New York residents. The following are key takeaways regarding SHIELD Act compliance.

MSP vs MSSP and the Changing Role of IT Security

Security of connected devices has been the driving motivation for digital trends in the 21st century. As people, companies, communities and even nations seek greater security, the need for strong cybersecurity is critical to success and stability for both professional and ...

Cyber-Warfare May Be On The Horizon — What It Means for the U.S.

According to a U.S. Department of Homeland Security (DHS) warning issued January 4, 2020, the government is preparing for the potential of Iran-sponsored cyberattacks following the January 3rd airstrike which killed Iranian commander Qasem Soleimani.

The 20 Guest Blog: Creating an Advanced Cybersecurity Package for MSP Clients

Security services are a great way to protect MSP clients, but should they be optional?

Breakdown of NIST Cybersecurity Framework

In 2013, recognizing the value of cybersecurity for businesses and the government at large, the President of the United States of America issued an executive order to improve critical infrastructure cybersecurity. With the aim of protecting the national and economic ...

Staying Secure: Cyber-Conscious Tips for Your Holiday Season

Black Friday, Cyber Monday, holiday gifts and New Year's celebrations – these are some of the factors that make November through January the most active online-shopping period of the year.

Cyber Defense Roster: Your key players in the fight against cyberattacks

Cyber criminals have no off season, neither should your security. Here’s a lineup of the cybersecurity solutions that team up to be your offense and defense.

The Rubber Ducky: Cyber meets physical with this small hacking tool

Your adversary may not always be on the other side of a screen.