BLOG

Mobile Device Management (MDM) for Small Businesses

In this day and age, the bring-your-own-device (BYOD) approach is increasingly more popular with small and medium sized corporations. Allowing employees to utilize their own personal smart phone for both business and personal use is a win-win: Corporations are able to save a considerable amount of money otherwise needed to supply work-only devices while employees […]

Read More

Two-factor Authentication: What is it and Why do I Care?

Google just last week announced that since 2017, not one single employee out of its 85,000+ staff has had their account successfully phished and taken over by hackers.  When we live in an age where 80,000 people fall for phishing scams every single day and exposing their passwords, how is it possible that Google has […]

Read More

Take your Cybersecurity Program to the Next Level

Many organizations design their cybersecurity program to conform to a compliance need but when a cyber breach occurs, those same organizations are left wishing they were better prepared. A to-do list without action is just a list. It will sit there taunting you until action is taken. But if you write a to-do list without […]

Read More

It’s Time to Upgrade Your IT Infrastructure

An organization’s IT infrastructure has become a vital part of all operations and affects nearly every aspect of the business.  As such, it is critical to keep all of your systems up to date with the latest security patches. Every piece of technology that touches your network including; desktops, laptops, phones, servers, switches, etc. should […]

Read More

Kyber Security Ranked Among Top 501 Global Managed Service Providers by Channel Futures

FAIRFIELD, CONN. (PRWEB) JULY 03, 2018: Kyber Security ranks among the world’s 501 most strategic and innovative managed service providers (MSPs), according to Channel Futures 11th-annual MSP 501 Worldwide Company Rankings. The MSP 501 is the first, largest and most comprehensive ranking of managed service providers worldwide. This year Channel Futures received a record number of […]

Read More

What can your Company Learn from the Timehop Cyber Incident?

This past weekend, the Timehop app announced a large network intrusion that affected over 21 million users. The app compiles information from all forms of social media and creates a “look back in time” for the user. The data that was breached included names, email addresses, and phone numbers. Luckily, no private messages, financial data, […]

Read More

So, You’re Suffering from a Data Breach?

Guest blog by: Andrew Davidson at AmVenture A data breach can be crippling for a small business. According to statistics provided by Small Business trends, a whopping 60% of small companies shut their doors within six months of a cyber attack, and yet only 14% of small business owners are highly confident in their ability to protect […]

Read More

Should my Business Implement the Zero Trust Model?

In the ever-changing world of cyber security the “Zero Trust” concept is a strategy that is elegant in its simplicity; do not trust anyone. The model was created by John Kindervag of Forrester Research Inc. in response to an increasing number of breaches due to the lax security on open connections.  Many organizations depend solely […]

Read More

Is cyber liability insurance necessary for my business?

The latest statistics show that 43% of cyber attacks target small businesses and 60% of those organizations attacked go out of business within 6 months of the attack. With the growing number of cyber attacks every day, the general thinking is not if you will will get breached, but when and how bad will it […]

Read More

What can I do to protect myself from being crypto-jacked?

Crypto-jacking is one of the latest fads in cyber crime.  As opposed to a cyber-criminal locking up your files and waiting for you to meet their ransom demands, they are simply stealing the CPU cycles of your computer to mine for crypto-currency around the world. Why would they do this? They do this because where […]

Read More