[vc_row][vc_column][vc_column_text]Last Friday, yet another large scale cyber attack made headlines. Known as "WeCry", "WannaCrypt", "WeCrypt0r", or "WannaCrypt0r", this latest attack was aimed primarily at enterprises, not the general public (like the Google Docs...
Cyber Security
VPNs – Are They the Natural Next Step in Cybersecurity?
[vc_row][vc_column][vc_column_text]Since the beginning of time, humans have sought out new ways to make their lives easier. Early man invented simple tools to help him survive. Modern man invented the internet. It is arguably one of the most useful tools ever created...
Death, Taxes, & Data Breaches? How to Manage Cybersecurity Risk.
[vc_row][vc_column][vc_column_text]There used to be two certainties in life: death and taxes. We think it's time to update the saying and include cybersecurity breaches. While computers and the internet have undoubtedly improved our productivity, they have also made...
Cybersecurity News: Google Doc Phishing Issue Follow Up
[vc_row][vc_column][vc_column_text]Yesterday was a bad day for some Google users. News spread quickly about a phishing attack within the Google system. Estimates now say only 0.1% of users were affected. But, at a billion users, that still equates to a million people...
May the Fourth Protect You – It’s World Password Day
[vc_row][vc_column][vc_column_text]The 4th of May has been celebrated by Star Wars geeks for several decades. When spoken, the date bears a strong resemblance to the saying, "May the Force be with you." This year, there's another holiday worth geeky celebration...
What Is Cyber Liability Insurance? Do I Need It?
[vc_row][vc_column][vc_column_text] Cyber Liability Insurance is a service more and more insurers are offering, but is it just a waste of money? The word insurance makes people cringe. It presents the age old dilemma: Are you risk averse enough to pay for something...
Fake Emails to Ignore to Protect Your Cybersecurity
Hackers can be very clever, there's no doubt. They prey on uninformed email and internet users in the hopes of getting their malware into your network. Savvy users can spot the majority of spam emails and pop-ups pretty easily. But, sometimes we all get tricked. Here...
An Easter Malware Warning from Homeland Security
[vc_row][vc_column][vc_column_text] The United States Computer Emergency Readiness Team (US-CERT), a division of Homeland Security, published an important warning this morning regarding the upcoming holiday weekend and cybersecurity: As the Easter holiday approaches,...
The Key to Preventing Costly Network Downtime
The phrase "downtime" should bring one image to mind: a pile of money burning to ash. That's what network downtime does to your profits, destroys them. It's difficult to fully grasp the total cost of downtime because it's so muliti-faceted. In 2015, downtime was...
[Infographic] The Beastly IT Security Threats – A MUST READ
[vc_row][vc_column][vc_column_text]Data and IT Security are at the forefront of everyone's concerns these days. The news is overrun with headlines about breaches of corporations that you'd imagine would have tremendous security measures in place, but still fall victim...