<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">
Skip to main content

Blog

Families are Targets, Too: 5 Home Cybersecurity Tips

It’s not just big businesses that are at risk of being hacked or cyber-attacked. It may seem scary to let your kids go online after you hear that, but don’t throw all the computers away and live off-the-grid just yet. Try implementing these five cybersecurity practices in ...

A Security Engineer's Guide to EDR

Over the last 2 years, our team has been researching a number of platforms, frameworks, trainings, and various definitions of Endpoint Detection & Response (EDR) technology. And of course, the newest hot buzzword in cybersecurity: “Threat Hunting.” After all this ...

5 Easy Ways to Improve Your Cybersecurity at Work

It’s true, some of the smallest improvements can really be game changers — especially in cybersecurity. Whether you know it or not, cyber criminals see you—the end user—as an easy target. But don’t worry, you don’t need the newest security technology to protect yourself ...

MSP vs Hacker: Penetration Test Demo

We all know that security is hard… for an MSP, it’s even more difficult. In addition to balancing the everyday security risks that every business faces, MSP’s also have to focus on their customers’ networks. A lot of times, the security of customer networks take precedence ...

10 Mistakes that Will Get You Hacked

Sometimes, it's the little things that make a big difference. This is especially true for cybersecurity. Here are 10 common mistakes made in office settings that leave people vulnerable to cyber attacks, presented by Security Engineer, Will Tipton:

Spear Phishing: Be the Harder Target

You know how the story goes... Two guys are out hiking in the forest when they notice that a bear begins charging at them. One of the guys pulls off his heavy hiking boots and begins tying on a pair of running shoes.

Business Email Compromise: What is it, and How Can it Affect Me?

You may have heard the statistic: 90% of breaches start with email. But you’re probably thinking, that won’t happen to me. You know the signs of a phishing email and you avoid emails that are clearly unsafe, so you’re not going to be the one who gets breached, right?

“You have 48 hours after reading this letter” – How to Identify the Latest Phishing Scam

One of the latest phishing scams affecting small businesses is a message that alleges “your email account and device been hacked” and that “we have installed one RAT software into your device.”

Vulnerability Management: Don’t Be That Guy

Ignore security at your own and your customers’ peril. Recently there was a post on r/sysadmin from a network administrator who had a client system hacked because he left their iLO card facing the internet…

Scam Alert: Sextortion Email Using Real Passwords

In the past 48 hours, security operators have seen a new ‘sextortion’ message begin popping up in client inboxes almost everywhere. The most frightening part of this message is that it lists a password either in the subject line or the first sentence.

GDPR: Is Your Cybersecurity Strategy Ready?

If the GDPR affects your business, you may need to make some significant changes to your cybersecurity strategy. Here are four core areas to address in order to achieve technical compliance with the GDPR.

How to Get Notified When Someone Tampers with Your Mac

Admit it. You’ve left your computer unattended in a public place.

IoT and UPnP: A Dangerous Combination

Over the past 15 years, Internet of Thing (IoT) devices have radically changed the IT world, introducing many benefits along with some tricky downsides. For example, while vulnerabilities found within IoT devices have been common knowledge since 2006, the rapid development ...

A Simple Guide to Online Privacy and Protecting Your Identity

It is easier than ever for cyber criminals to obtain your private information, especially when “trustworthy” sites are the ones putting it on the line. Follow these simple steps to ensure you’re doing what you can to keep your information safe at work and at home:

Does Your Business Have an Incident Response Plan?

Your business experiences a data breach. What happens next?