Can Ransomware Strike the Cloud? Three Types of Attacks
By: Jamie Moore & Amy MerschOctober 9, 2019
Storing your files in the cloud isn't the same as backing them up. This common mistake can leave your cloud data vulnerable to hackers and ransomware.
Email Scams: 13 Ways to Protect Yourself and Your Organization
By: Jamie Moore & Amy MerschOctober 2, 2019
If you receive an email asking for money or access, it's probably a scam. Here are more ways to spot an email scam and defend against these cyber threats.
Three Common Email Scams that Can Sneak Past Your Spam Filter
By: Jamie Moore & Amy MerschOctober 1, 2019
Is your spam filter protecting you & your organization from malicious emails? Learn more about three common email scams built to bypass your email filter.
Today's Cyber Threat Landscape: 10 Cyber Security Stats for SMBs
By: Jamie Moore & Amy MerschJuly 29, 2019
In an increasingly digital world, cyber criminals are turning their focus to small and medium-sized businesses. Here are 10 cyber security stats to know.
Windows 7 End of Life: What You Need to Know
By: Amy MerschJune 18, 2019
Windows 7, Windows Server 2008, and Windows SBS 2011 reach end of life in January 2020, leaving organizations vulnerable to cyber security threats.
[eBook] 14 Ways to Safeguard Your Business Against Cyber Attacks
By: Amy MerschJanuary 28, 2019
Small and medium-sized businesses are increasingly becoming targets for cyber criminals. Is your business secure? Here are 14 cyber security tools that will help keep your SMB from today’s leading cyber attacks.
3 Tools to Keep Your SMB Data Secure During the Holidays
By: Danielle HovermanDecember 17, 2018
While the holiday season is a great time to enjoy office festivities and spend time with family and friends, it’s also a time for phishing scams, hackers stealing information, and the loss of your online privacy. Here are three tools that are critical to ensuring safe and secure online activities.
6 Detective Security Controls Your Business Should Implement
By: Danielle HovermanNovember 27, 2018
With preventative security controls in place, you also need to deploy detective security controls. Detective security controls enable you to constantly monitor and review controls to ensure they are working properly and providing effective security. Here are 6 detective security controls.
8 Preventative Security Controls You Should Consider
By: Danielle HovermanNovember 20, 2018
There are many security controls that you can implement when designing a multi-layered security infrastructure, and those controls generally fall into two categories: preventative and detective. The following are 8 preventive security controls that your business should consider.
Traditional Security vs Layered Security | Identifying the Differences
By: Danielle HovermanNovember 15, 2018
It’s clear that traditional security is no longer effective in the reality of today’s complex cyber threat landscape. By not adopting a layered security approach, many businesses have gaping holes in their security efforts.