window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-27228569-3');
2309, 2022

New Reports Show How Ad Accounts Are Being Hijacked Thanks to Phishing on LinkedIn

By |September 23, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , |

While cyber attackers have long gone after email as a way to hack their way into a victim's computer or network, they now have their eyes on a new target: LinkedIn. Unsurprisingly, LinkedIn is beginning to rise as an attack vector. According to the company, LinkedIn now has 830 million [...]

909, 2022

Report: 30% of Employees Don’t Understand the Importance of Cybersecurity

By |September 9, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , |

Over the past few years, we have seen an explosion of cybersecurity attacks targeting businesses of all sizes — from the largest enterprise to the smallest SMB. However, despite all these attacks splashing across headlines, new research shows that a third of employees still don't understand the importance of cybersecurity. [...]

2608, 2022

Top 3 Risks of Collaboration Tools

By |August 26, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , |

Collaboration tools have only become more prevalent in our age of remote or hybrid work, as they enable employees, no matter where they are in the world, to work together on the same asset. This improves efficiencies within the workflow of a small and medium business (SMB) and makes it [...]

2207, 2022

What the End of Internet Explorer Means for You

By |July 22, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , |

As we all began our first forays onto the internet, it's more than likely that you did so through Internet Explorer. Marked with an iconic letter "E" and a yellow orbit, the web browser, for much of the history of the internet, was the dominant browser used by individuals and [...]

807, 2022

Verizon Report: Ransomware Continues to Rise

By |July 8, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , |

You were right if it felt like ransomware attacks were all over the headlines over the past year. According to the 2022 Verizon Data Breach Investigations Report, ransomware attacks were up more than the last five years combined last year and marked an “unprecedented year in cybersecurity history.” According to [...]

2406, 2022

BlackCat Ransomware: Here’s What to Know

By |June 24, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , |

Ransomware remains a massive cybersecurity challenge for organizations everywhere, with costs expected to rise from $20 billion in 2021 to $265 billion by 2031, according to estimates by Cybersecurity Ventures. This is a significant increase that's affecting nearly every organization worldwide, from the smallest SMB to the largest global enterprise. [...]

1006, 2022

The Latest Facebook Phishing Attack: Here’s What to Know

By |June 10, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , |

As cyberattacks continue to rise, phishing remains one of the most prevalent ways for attackers to break past small and medium business (SMB) defenses and compromise an organization. According to the Verizon Data Breach Report for 2021, phishing remained the top vector of attack for organizations, present in 36 percent [...]

2005, 2022

Report: More than $6.9B Lost to Cyber Crimes in 2021

By |May 20, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , |

If you felt like the headlines in 2021 were dominated by cyberattacks and cybercrime, you were right. The data is in, and 2021 was a record year for cybercrime on every front, with $6.9 billion lost to internet crimes during the year, according to the FBI’s 2021 Internet Crime Report [...]

605, 2022

QR Codes: The Risks, Benefits, and Real-World Applications

By |May 6, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , |

Over the past two years, we have seen a fast rise in the usage of QR codes to help customers quickly access web pages on the go. This has opened the door for new ways for SMBs to market and share important information and new potential risks for customers. According [...]

804, 2022

Why Companies Are Moving to a Zero Trust Model of Cyber Security

By |April 8, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , |

When it comes to cyber security, one of the biggest buzzwords circulating the market is "Zero Trust." Zero Trust is a principle that starts from an assumption that nothing can be trusted — be it users or devices — and blocks them from network access until they can prove themselves [...]

Go to Top