The 12 Days of Cybersecurity: Day 9

The 12 Days of Cybersecurity: Day 9

In the age of work from home and remote computing, cyber criminals are looking for new and innovative ways to infiltrate organizations and steal their precious data.  One of the most recent methods is though your mobile devices on your home network.  Since we now...
12 Days of Cybersecurity: Day 8

12 Days of Cybersecurity: Day 8

If your idea of cybersecurity is a firewall and anti-virus then your organization could be at extreme risk. Firewalls and other preventive forms of cybersecurity are effective at preventing basic cyberattacks.  However, over the past decade it has become clear that...
Business Email Compromise Prevention

Business Email Compromise Prevention

Business Email Compromise (BEC) Imagine your CFO or Controller having a compromised email account. This could become a huge problem for your organization. The cyber criminal will work in the background to monitor the email box and watch the passing conversations. ...
Is Zoom Software Safe to Use?

Is Zoom Software Safe to Use?

The world is slowing down during this COVID-19 pandemic. We’re told to quarantine or self-isolate and not engage in groups. But there’s one group that’s not slowing down at all, cyber criminals. Cyber criminals and hackers will turn a global crisis into an opportunity...