window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-27228569-3');
2309, 2022

New Reports Show How Ad Accounts Are Being Hijacked Thanks to Phishing on LinkedIn

By |September 23, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , |

While cyber attackers have long gone after email as a way to hack their way into a victim's computer or network, they now have their eyes on a new target: LinkedIn. Unsurprisingly, LinkedIn is beginning to rise as an attack vector. According to the company, LinkedIn now has 830 million [...]

909, 2022

Report: 30% of Employees Don’t Understand the Importance of Cybersecurity

By |September 9, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , |

Over the past few years, we have seen an explosion of cybersecurity attacks targeting businesses of all sizes — from the largest enterprise to the smallest SMB. However, despite all these attacks splashing across headlines, new research shows that a third of employees still don't understand the importance of cybersecurity. [...]

2608, 2022

Top 3 Risks of Collaboration Tools

By |August 26, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , |

Collaboration tools have only become more prevalent in our age of remote or hybrid work, as they enable employees, no matter where they are in the world, to work together on the same asset. This improves efficiencies within the workflow of a small and medium business (SMB) and makes it [...]

1208, 2022

Zero-Trust Architecture: Everything You Need to Know

By |August 12, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , |

Zero Trust has become one of cybersecurity's biggest buzzwords, but what does it mean? In short, Zero Trust assumes that all users and devices are insecure until proven otherwise and then implements the security architecture to support that. This concept is a significant departure from the traditional network security approach [...]

2207, 2022

What the End of Internet Explorer Means for You

By |July 22, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , |

As we all began our first forays onto the internet, it's more than likely that you did so through Internet Explorer. Marked with an iconic letter "E" and a yellow orbit, the web browser, for much of the history of the internet, was the dominant browser used by individuals and [...]

807, 2022

Verizon Report: Ransomware Continues to Rise

By |July 8, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , |

You were right if it felt like ransomware attacks were all over the headlines over the past year. According to the 2022 Verizon Data Breach Investigations Report, ransomware attacks were up more than the last five years combined last year and marked an “unprecedented year in cybersecurity history.” According to [...]

2406, 2022

BlackCat Ransomware: Here’s What to Know

By |June 24, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , |

Ransomware remains a massive cybersecurity challenge for organizations everywhere, with costs expected to rise from $20 billion in 2021 to $265 billion by 2031, according to estimates by Cybersecurity Ventures. This is a significant increase that's affecting nearly every organization worldwide, from the smallest SMB to the largest global enterprise. [...]

Go to Top