Iran Cyber Attack Warning

Rising tensions between the United States and Iran could inspire Iran to launch cyber attacks against U.S. infrastructure. Following the January 2, 2020 U.S. strike in Iraq that killed Iranian IRGC-Quds Force commander Qassem Soleimani, the U.S. Department of Homeland Security recently sent out a National Terrorism Advisory Bulletin stating the following: Iranian leadership and several […]

Read More

phishing scam

Municipality Ransomware

In the month of July, The Identify Theft Resource Center identified 110 data breaches. Of which, over 106 million records were exposed across the financial, business, education, government, and health care sectors. Whether you were affected by these breaches or not, you are still susceptible to phishing scams targeting post breach victims. Capital One Breach […]

Read More

4 Tips to Help SMBs Defeat Ransomware

Datto recently surveyed over 1,400 of our managed service provider (MSP) partners across the globe to gain insight into their perspective on the current landscape of ransomware and cybersecurity. This report provides a wealth of detail on ransomware, including year over year trends, frequency, targets, impact, and recommendations for recovery and continuity in the face […]

Read More

breach level index

Breach Level Index

When cyber breaches occur, it seems the media hones in mainly on the scope of the incident, i.e. how many people were impacted.  While the amount of people impacted by a breach is important information, it is critical to not fall into the trap of thinking that the size of the breach is the stand-alone […]

Read More

cyber monday security

Cyber Monday Warning

Cyber Monday is here and with it, comes cyber risks. In general, online shopping is raising more security concerns this year, because online browsing continues to become more diverse. With smart phones and tablets, the online channel grown much further past just desktop computers. To make matters more complicated, more consumers are mixing personal mobile […]

Read More

email hyjacking

Email Hyjacking

This could happen to you You regularly handle proprietary financial information for your organization. Investors, clients, and potential partnerships trust your word and advice which you often communicate via email. You’ve recently started noticing something a bit fishy with your emails but nothing seems too concerning. Then you start to catch a couple more red […]

Read More


Multifactor Authentication Can’t Stop ALL Cyber Attacks

Multifactor Authentication (MFA) was developed to help protect unauthorized user logins. In the past, this defense was extremely effective and (contrary to the rumor mill) continues to be effective today. However, hackers continue to develop new approaches to phish users, access credentials, spy on browser activity, and compromise machines. As these cyber threats continue to […]

Read More


Own IT. Secure IT. Protect IT.

In a new study, 80% of SMB respondents reported being “somewhat” or “very” concerned about a cyber breach but only 31% reported that their companies provide them with annual company-wide training. With National Cybersecurity Awareness Month beginning today, we can help bridge that gap. Established by the Department of Homeland Security, October serves as the […]

Read More

Supply Chain Hacking

No matter how robust your internal cybersecurity strategy is, your supply chain could be your weakest [and most costly] link. In a new string of targeted attacks, attackers will target the most vulnerable part of a supply chain to reach their intended victim. This specific hacking operation, known as Tortoiseshell, targets IT providers with malware. […]

Read More


Will the New DoD Standard Crush Your Business?

The Defense Department recently released a new draft of the Cybersecurity Maturity Model Certification (CMMC). The goal of this certification is to create a simpler and more consistent framework for the cyber demands imposed on government contractors and subcontractors. The CMMC will review and combine various cybersecurity standards and best practices and map these controls […]

Read More