Blog
Cybersecurity Awareness Month Wrap Up
Cybersecurity Awareness Month has come to a close. We have given you tips to help you #SeeYourselfinCyber and strengthen your safe security practices. This annual...
Cybersecurity Awareness Month - Week Four
This year's theme is "See Yourself in Cyber" and focuses on the people aspect of cybersecurity. We can all do our part to keep ourselves,...
Cybersecurity Awareness Month - Week Three
This year's theme is "See Yourself in Cyber" and focuses on the people aspect of cybersecurity. We can all do our part to keep ourselves,...
Cybersecurity Awareness Month - Week Two
This year's theme is "See Yourself in Cyber" and focuses on the people aspect of cybersecurity. We can all do our part to keep ourselves,...
Cybersecurity Awareness Month - Week One
This year's theme is "See Yourself in Cyber" and focuses on the people aspect of cybersecurity. We can all do our part to keep ourselves,...
October is Cybersecurity Awareness Month
Cybersecurity Awareness Month was first declared in 2004 in an effort to help individuals protect themselves online against threats to technology and data. This year's...
Layered Security
No organization is immune to cyber attacks. Cyber criminals often target small- to medium-sized businesses (SMBs) because they find them to be the most lucrative...
The Cost of a Data Breach
There are many facets of cyber crimes. Some attacks are meant to disrupt normal business activity, while others may aim to steal or encrypt data in an effort...
More Cyberbullying: Doxing
Using social media can be entertaining and educational, connecting us with others. These platforms allow users to share photos, send messages, game with friend, posts...
2022 H1 Global Threat Analysis Report
The H1 2022 Global Threat Analysis Report provides detailed insights into network and application attack activity.
Back to School
Summer fun is over, and kids are heading back to the classrooms. Pens, papers and electronic devices of all sorts will be accompanying them. They are...
Private Browsing
What is private browsing? Your browser (Chrome, Firefox, Edge, etc.) has a setting that allows you to set your web browser in a way that...
Adult Cyberbullying
Cyberbullying is bullying that takes place in a digital environment. The bully will use social media and text messaging to harass their victim. Cyberbullying is...
Cybersecurity Focus: Physical Security
The physical security of your facility, network, data and personnel is essential. Failure to safeguard any of these components can lead to a breakdown in...
Can a Wireless Keyboard Be Hacked?
Wireless keyboards connect to a device via Bluetooth. Most require a USB dongle in order for the keyboard to be recognized by the device. Early...
Are You Snipe Hunting?
Threat hunting involves proactively seeking out cyber threats that may have slipped into your network. If a cyber crook slips past your defenses and finds...
Americans Worried About Online Data Security - But Maybe Not Enough
Safeguarding your personal data in a digital age is a problem for everyone. A poll by Ipsos on behalf of Google found that 84% of...
Don't Get Hooked!
Phishing awareness education can save money and reputation, protect assets and keep you from becoming front page news. Phishing is a social engineering technique used by...
Endpoint Protection: Do You Need It?
What is endpoint protection? Simply stated, it is the defenses that are enabled on end user devices. Some solutions are no cost. Some are low...
Threat Modeling
Identifying vulnerabilities and potential security threats while weighing the impact on an organization will assist with prioritizing how to address these weaknesses. This is threat modeling. Primarily...