window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-27228569-3');
2406, 2022

BlackCat Ransomware: Here’s What to Know

By |June 24, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , , |

Ransomware remains a massive cybersecurity challenge for organizations everywhere, with costs expected to rise from $20 billion in 2021 to $265 billion by 2031, according to estimates by Cybersecurity Ventures. This is a significant increase that's affecting nearly every organization worldwide, from the smallest SMB to the largest global enterprise. [...]

1006, 2022

The Latest Facebook Phishing Attack: Here’s What to Know

By |June 10, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , |

As cyberattacks continue to rise, phishing remains one of the most prevalent ways for attackers to break past small and medium business (SMB) defenses and compromise an organization. According to the Verizon Data Breach Report for 2021, phishing remained the top vector of attack for organizations, present in 36 percent [...]

2005, 2022

Report: More than $6.9B Lost to Cyber Crimes in 2021

By |May 20, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , |

If you felt like the headlines in 2021 were dominated by cyberattacks and cybercrime, you were right. The data is in, and 2021 was a record year for cybercrime on every front, with $6.9 billion lost to internet crimes during the year, according to the FBI’s 2021 Internet Crime Report [...]

605, 2022

QR Codes: The Risks, Benefits, and Real-World Applications

By |May 6, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , |

Over the past two years, we have seen a fast rise in the usage of QR codes to help customers quickly access web pages on the go. This has opened the door for new ways for SMBs to market and share important information and new potential risks for customers. According [...]

2004, 2022

What is a Cybersecurity Maturity Model?

By |April 20, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , |

Cyberattacks have increased exponentially over the past few months, hitting businesses of all sizes and industries. Damages globally are estimated to have reached $6 trillion in 2021 and are on track to rise to $10.5 trillion by 2025 — a staggering sum. Small and medium businesses (SMBs) have proven particularly [...]

804, 2022

Why Companies Are Moving to a Zero Trust Model of Cyber Security

By |April 8, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , |

When it comes to cyber security, one of the biggest buzzwords circulating the market is "Zero Trust." Zero Trust is a principle that starts from an assumption that nothing can be trusted — be it users or devices — and blocks them from network access until they can prove themselves [...]

2503, 2022

Plan Your Windows Server 2012 and 2012 R2 End of Support Today

By |March 25, 2022|Categories: Security|Tags: , , , , , , , , , , , , , , |

As the saying goes, all good things must come to an end. This is true even for systems we use to run business-critical and mission-critical workloads, such as Windows Server 2012 and 2012 R2. Microsoft recently announced that it would stop support for older versions of Windows Server, including Windows [...]

1103, 2022

Report: Nearly Every Enterprise Hit by Successful Cyber Incident

By |March 11, 2022|Categories: Security|Tags: , , , , , , , , , , , , , |

You only have to turn on the TV or open a newspaper to see that cyberattacks have been on the rise over the last number of years. However, according to a recent report, the impact may be bigger than we even think. According to the Anomaly Cybersecurity Insights Report, which [...]

2502, 2022

Log4j Exploit: What SMBs Should Know

By |February 25, 2022|Categories: Security|Tags: , , , , , , , , , , , , , |

At the end of 2021, news emerged of a new vulnerability in Log4j, a Java library that underlies many of the world's applications. Since then, this security flaw has been widely recognized as one of the most potentially dangerous vulnerabilities in history. This vulnerability introduces a new significant risk for [...]

Go to Top