What is Layered Security & How Does it Defend Your Network?
By: Amy MerschOctober 4, 2021
No single tool can guarantee your network’s security. That's why we recommend a layered security approach to improve your organization’s cyber posture.
Five Threats to Your Mobile Device Security & How to Protect Your Data
By: Jamie Moore & Amy MerschOctober 30, 2019
Your mobile device offers access to some of your life's most important information. Protect yourself & your data from these common mobile security threats.
Today's Cyber Threat Landscape: 10 Cyber Security Stats for SMBs
By: Jamie Moore & Amy MerschJuly 29, 2019
In an increasingly digital world, cyber criminals are turning their focus to small and medium-sized businesses. Here are 10 cyber security stats to know.
Windows 7 End of Life: What You Need to Know
By: Amy MerschJune 18, 2019
Windows 7, Windows Server 2008, and Windows SBS 2011 reach end of life in January 2020, leaving organizations vulnerable to cyber security threats.
[eBook] 14 Ways to Safeguard Your Business Against Cyber Attacks
By: Amy MerschJanuary 28, 2019
Small and medium-sized businesses are increasingly becoming targets for cyber criminals. Is your business secure? Here are 14 cyber security tools that will help keep your SMB from today’s leading cyber attacks.
6 Detective Security Controls Your Business Should Implement
By: Danielle HovermanNovember 27, 2018
With preventative security controls in place, you also need to deploy detective security controls. Detective security controls enable you to constantly monitor and review controls to ensure they are working properly and providing effective security. Here are 6 detective security controls.
8 Preventative Security Controls You Should Consider
By: Danielle HovermanNovember 20, 2018
There are many security controls that you can implement when designing a multi-layered security infrastructure, and those controls generally fall into two categories: preventative and detective. The following are 8 preventive security controls that your business should consider.
Traditional Security vs Layered Security | Identifying the Differences
By: Danielle HovermanNovember 15, 2018
It’s clear that traditional security is no longer effective in the reality of today’s complex cyber threat landscape. By not adopting a layered security approach, many businesses have gaping holes in their security efforts.
Is That Email Legitimate? Remain Vigilant by Spotting Email Phishing Scams
By: Danielle HovermanOctober 29, 2018
Phishing continues to be one of the biggest threats’ businesses are facing today, both in terms of network security and financial loss. Here are 3 tips to help you identify email phishing scams.
How Does Data Get Compromised During an Attack? Common Cyber Scams to Watch Out For
By: Danielle HovermanOctober 23, 2018
While most phishing attacks are sent by email or deceptive websites, there are many other approaches that hackers can take. Here are 7 tips to help you identify common cyber scams and understand how data gets compromised during an attack.