window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-27228569-3');
2110, 2022

Browser Extension Threats: What You Should Know

By |October 21, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , , |

For many users, the portal to the web is through a browser, such as Chrome, Safari, Microsoft Explorer, or Firefox. Most users have at least one browser, if not multiple, that they use daily. However, as with most popular pieces of technology, cyber attackers have set their sights on leveraging [...]

710, 2022

3 Things to Know About Callback Phishing

By |October 7, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , |

Cybercriminals are getting increasingly creative about how they're targeting small and medium businesses (SMBs). One of the latest innovations seeing massive growth is callback phishing, which rose 625 percent in frequency since Q1 2021. Phishing as a category overall is one of the most common vectors of attack that compromise [...]

2309, 2022

New Reports Show How Ad Accounts Are Being Hijacked Thanks to Phishing on LinkedIn

By |September 23, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , |

While cyber attackers have long gone after email as a way to hack their way into a victim's computer or network, they now have their eyes on a new target: LinkedIn. Unsurprisingly, LinkedIn is beginning to rise as an attack vector. According to the company, LinkedIn now has 830 million [...]

909, 2022

Report: 30% of Employees Don’t Understand the Importance of Cybersecurity

By |September 9, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , |

Over the past few years, we have seen an explosion of cybersecurity attacks targeting businesses of all sizes — from the largest enterprise to the smallest SMB. However, despite all these attacks splashing across headlines, new research shows that a third of employees still don't understand the importance of cybersecurity. [...]

2608, 2022

Top 3 Risks of Collaboration Tools

By |August 26, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , |

Collaboration tools have only become more prevalent in our age of remote or hybrid work, as they enable employees, no matter where they are in the world, to work together on the same asset. This improves efficiencies within the workflow of a small and medium business (SMB) and makes it [...]

1208, 2022

Zero-Trust Architecture: Everything You Need to Know

By |August 12, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , |

Zero Trust has become one of cybersecurity's biggest buzzwords, but what does it mean? In short, Zero Trust assumes that all users and devices are insecure until proven otherwise and then implements the security architecture to support that. This concept is a significant departure from the traditional network security approach [...]

2207, 2022

What the End of Internet Explorer Means for You

By |July 22, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , |

As we all began our first forays onto the internet, it's more than likely that you did so through Internet Explorer. Marked with an iconic letter "E" and a yellow orbit, the web browser, for much of the history of the internet, was the dominant browser used by individuals and [...]

Go to Top