Cybersecurity has become a hot topic for Managed Service Providers (MSPs) and their small business clients. It has become clear that MSPs who don't provide cybersecurity to their clients are falling behind, but the quality of the cybersecurity offerings is also a key factor.
Understanding cybersecurity can be complex in today's constantly-evolving threat landscape. With every new advancement in technology comes a new opportunity for hackers, a new avenue for attack, and a new vulnerability to be exploited.
It’s not just big businesses that are at risk of being hacked or cyber-attacked. It may seem scary to let your kids go online after you hear that, but don’t throw all the computers away and live off-the-grid just yet. Try implementing these five cybersecurity practices in ...
It’s true, some of the smallest improvements can really be game changers — especially in cybersecurity. Whether you know it or not, cyber criminals see you—the end user—as an easy target. But don’t worry, you don’t need the newest security technology to protect yourself ...
Sometimes, it's the little things that make a big difference. This is especially true for cybersecurity. Here are 10 common mistakes made in office settings that leave people vulnerable to cyber attacks, presented by Security Engineer, Will Tipton:
You know how the story goes... Two guys are out hiking in the forest when they notice that a bear begins charging at them. One of the guys pulls off his heavy hiking boots and begins tying on a pair of running shoes.
If the GDPR affects your business, you may need to make some significant changes to your cybersecurity strategy. Here are four core areas to address in order to achieve technical compliance with the GDPR.
It is easier than ever for cyber criminals to obtain your private information, especially when “trustworthy” sites are the ones putting it on the line. Follow these simple steps to ensure you’re doing what you can to keep your information safe at work and at home:
It is no secret that funds transfer fraud, aka Business Email Compromise (BEC) and Email Account Compromise (EAC), is on the rise for both businesses and consumers. These losses occur when a threat actor, through social engineering or computer intrusion techniques, can ...
It’s not fun, but it’s necessary. One of our very own Security Analysts recently proved why log review is a crucial step in protecting our customer’s networks.
When you think of a hacker, do you imagine a hooded villain, secretly prying into the lives of unsuspecting victims? Hackers are criminals, right? They are the brilliant masterminds behind stolen identities, disrupted lives, and bankrupted businesses. What about White Hat ...
Think of the last time you purchased a brand new car. What if it didn’t work after only one day? You jump in your shiny new ride, fasten your seat belt and turn the ignition, and … nothing. The car won’t start.
When you think about organizations that have experienced a data breach, what are the first ones that come to mind? If you’re like most people, chances are your answers were likely Target, Home Depot, The IRS, Anthem Blue Cross, or any of the other big-name breaches that ...
Vulnerability scans are a great way to dive deeper into a network and search for problems that may go otherwise undetected. Many times, however, security professionals are performing scans that are only scratching the surface of what could potentially be uncovered.
There is still quite a bit of confusion out there on the differences between a Vulnerability Scan and a Penetration Test. The truth is both services can be successful in keeping you ahead of the hackers, but the trick is knowing which one is right for you and when.