window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-27228569-3');
710, 2022

3 Things to Know About Callback Phishing

By |October 7, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , |

Cybercriminals are getting increasingly creative about how they're targeting small and medium businesses (SMBs). One of the latest innovations seeing massive growth is callback phishing, which rose 625 percent in frequency since Q1 2021. Phishing as a category overall is one of the most common vectors of attack that compromise [...]

1208, 2022

Zero-Trust Architecture: Everything You Need to Know

By |August 12, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , |

Zero Trust has become one of cybersecurity's biggest buzzwords, but what does it mean? In short, Zero Trust assumes that all users and devices are insecure until proven otherwise and then implements the security architecture to support that. This concept is a significant departure from the traditional network security approach [...]

2004, 2022

What is a Cybersecurity Maturity Model?

By |April 20, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , |

Cyberattacks have increased exponentially over the past few months, hitting businesses of all sizes and industries. Damages globally are estimated to have reached $6 trillion in 2021 and are on track to rise to $10.5 trillion by 2025 — a staggering sum. Small and medium businesses (SMBs) have proven particularly [...]

1111, 2021

IT Security vs IT Compliance: Where Are the Differences?

By |November 11, 2021|Categories: Security|Tags: , , , , , , , , , , , , |

When it comes to limiting risk for your business, many SMBs turn to compliance as the gold standard to build their cyber strategies (and conveniently also help avoid pesky fines). However, it's important to note that implementing a good IT security strategy is different from meeting compliance needs. There are [...]

2010, 2021

When to Use Breakout Rooms in Microsoft Teams

By |October 20, 2021|Categories: Security|Tags: , , , , , , , , , , , , |

Many small and medium business (SMB) owners are now beginning to take advantage of the virtual collaboration tools as they look to replicate the in-person work experience for remote workers. One new tool to help with this task is Microsoft Teams Breakout Rooms, which allows for the creation of smaller [...]

1410, 2021

Business Continuity Management For Natural and Not-So-Natural Disasters

By |October 14, 2021|Categories: Security|Tags: , , , , , , , , , , , , , |

Recently, the Northeast was battered by rain from two separate storm systems: Henri and Ida.  Both systems brought tropical level downpours and flooding to the area, with Ida hitting particularly hard.  The impact of these storms left many companies throughout the region unable to operate because their physical locations were [...]

810, 2021

Report: Gartner Survey Reveals a 44% Rise in Workers’ Use of Collaboration Tools Since 2019

By |October 8, 2021|Categories: Security|Tags: , , , , , , , , , , , , |

Over the past year and a half, many employees worldwide made the overnight shift to remote work. But what has that shift meant for an SMB’s technology tool chest and what they need to support their employee’s productivity? According to the recent Digital Worker Experience Survey by Gartner, many tools [...]

2409, 2021

Report: Cyberattacks More Than Double in First Half of 2021

By |September 24, 2021|Categories: Security|Tags: , , , , , , , , , , , , |

It's hard to miss the news these days of companies getting hacked. From the Colonial Pipeline to hospitals to mom-and-pop SMBs, every organization seems to be the target of cyberattacks. The data proves that out. According to Accenture's Cyber Incident Response Update, cyber intrusion activity volume globally jumped 125 percent [...]

2708, 2021

The Legal Response to Ransomware

By |August 27, 2021|Categories: Security|Tags: , , , , , , , , , , , , |

When ransomware hits a business, the firm has two options.  They can choose to pay the ransom to unlock their data. Or, they can refuse to pay the ransom and attempt to unlock their data and recover their systems using their own tools or outside help.  In an ideal world, [...]

Go to Top