BLOG

MFA

Multifactor Authentication Can’t Stop ALL Cyber Attacks

Multifactor Authentication (MFA) was developed to help protect unauthorized user logins. In the past, this defense was extremely effective and (contrary to the rumor mill) continues to be effective today. However, hackers continue to develop new approaches to phish users, access credentials, spy on browser activity, and compromise machines. As these cyber threats continue to […]

Read More

October

Own IT. Secure IT. Protect IT.

In a new study, 80% of SMB respondents reported being “somewhat” or “very” concerned about a cyber breach but only 31% reported that their companies provide them with annual company-wide training. With National Cybersecurity Awareness Month beginning today, we can help bridge that gap. Established by the Department of Homeland Security, October serves as the […]

Read More

Supply Chain Hacking

No matter how robust your internal cybersecurity strategy is, your supply chain could be your weakest [and most costly] link. In a new string of targeted attacks, attackers will target the most vulnerable part of a supply chain to reach their intended victim. This specific hacking operation, known as Tortoiseshell, targets IT providers with malware. […]

Read More

DoD

Will the New DoD Standard Crush Your Business?

The Defense Department recently released a new draft of the Cybersecurity Maturity Model Certification (CMMC). The goal of this certification is to create a simpler and more consistent framework for the cyber demands imposed on government contractors and subcontractors. The CMMC will review and combine various cybersecurity standards and best practices and map these controls […]

Read More

hurricane dorian

Cyber Scammers Will Rub Salt on the Wounded

A couple weeks ago, Hurricane Dorian struck and devastated our friends in the south. After natural disasters like Hurricane Dorian, cyber scams often target people who are in need or looking to help those in need. Many affected victims need to get their homes cleaned up or repaired and bystanders are looking to help relief […]

Read More

phishing scam

Post Cyber Incidents Phishing Scams Arise

In the month of July, The Identify Theft Resource Center identified 110 data breaches. Of which, over 106 million records were exposed across the financial, business, education, government, and health care sectors. Whether you were affected by these breaches or not, you are still susceptible to phishing scams targeting post breach victims. Capital One Breach […]

Read More

pii

Your Personal Information is Exposed… Again

We see headlines such as “Capital One Suffers Data Breach Affecting Over 100 Million Across America” all the time. Sadly, the more we see headlines like these, the more desensitized we are to them. We see our personal information exposed such as names, email addresses, and even social security numbers as a normal everyday occurrence. […]

Read More

NIST Cybersecurity Framework

The NIST Cybersecurity Framework 5th Anniversary

In five years, NIST has gone from being a framework to help develop an effective security program and posture, to a recognized process that has enabled successful conversations to bridge the gap between security and senior leadership. The NIST Cybersecurity Framework (CSF) was originally introduced at a time when large-scale cyber attacks (such as CryptoLocker […]

Read More

resigns

CEOs: The Cybersecurity Breach is Your Fault

As a CEO, it is your duty to grow your business and protect it from anything that could hinder its achievements and progress. Cybersecurity is no exception. It is time for CEOs to take the reins on cybersecurity, not only for the well-being of their organizations, but also for themselves. A Gartner analysis of security […]

Read More

cybersecurity business travel

Cyber Security Tips for Business Travel

Do you or your employees travel for business? You may enforce strict IT security policies in the office but are they effective outside of the office?  I know when I travel, my brain turns to mush. I am usually more concerned about where I am going rather than what Wi-Fi network my phone is connected […]

Read More