What is a Qualified Technology Executive, and Why Does Your Company Need One? The following webinar uses an example of browser hardening an example to understand why a technology executive is required. This is not a technical webinar for technical people. It is a webinar for bu... Cybersecurity M365 Managed Security Microsoft browser chrome edge hardening security Jun 19, 2024 Educational Articles
Trending: Current Events and Scams - May 2024 If there is a current event, you can be sure a scam is running rampant! Shocking headlines about hot topics often catch our attention more than a typical piece of online content, and cybercriminals ar... Awareness Deepfakes Fake News Scams May 30, 2024 Newsletters
PII and Passwords - April 2024 Personally Identifiable Information (Pll) and passwords are important terms in cybersecurity. Think of each bit of Pll as a puzzle piece that outlines who you are. Your password is the lock on the doo... PII Password Managers Passwords Scams May 28, 2024 Newsletters
I.T. : THE NEXT FRONTIER Put your IT skills to the test. Booby-trapped chambers! Pits of despair! And most horrifying of all —a bunch of space heaters, all plugged into one surge protector! Welcome to Server Room of Doom — th... Best Practices Power Procurement Rack Strategy May 13, 2024 Educational Articles
Is Monitoring Telegram for Dark Web Data Worth It? A new place for threat actors When considering the need to look for client data, credentials, OSINT data, and more, the next place threat actors are operating and interfacing with others is Telegram. ... Password Security Strategy Apr 26, 2024 Educational Articles
Scams are Brewing - November 2023 As you take on holiday shopping with your warm brew in hand, remember, cybercriminals have new scams brewing too! Don’t let your online shopping or holiday social media posting grind to a halt because... Awareness Best Practices Cybersecurity Hacking Identity Security Phishing Dec 15, 2023 Newsletters
The Effect of AI on Social Engineering As technology continues to evolve, so do the tools and tactics employed by cybercriminals. Historically, criminals have been early adopters of new tech. Artificial Intelligence (AI) has emerged as a g... AI Awareness Cybersecurity Data Privacy Hacking Phishing Social Engineering Dec 15, 2023 Educational Articles
Reducing Your Risk Profile - haveibeenpwned.com What is haveibeenpwned.com? A "breach" is an incident where data has been unintentionally exposed to the public. Haveibeenpwned.com is a website that aggregates information on data breaches. You can s... Awareness Cybersecurity Dark Web Data Breach Identity Security Privacy Dec 5, 2023 Educational Articles
How to prepare for a future with no online privacy In the United States, and internationally, there are various legislative efforts claiming protection of children, but which will seriously limit or negate the possibility of encrypting user uploaded c... Awareness Cybersecurity Data Privacy Industry Nov 7, 2023 Educational Articles
The Potential of Microsoft Clipchamp now Unlocked for Business Whether you're a content creator, a business owner, or simply someone who enjoys sharing moments with friends and family, having the right tools to edit and enhance your videos is essential. Microsoft... Microsoft Productivity Software Vendor Oct 30, 2023 Educational Articles
Secure Our World - October 2023 Happy Cybersecurity Awareness Month! As our reliance on technology continues to grow, so does our need for strong cybersecurity. This Cybersecurity Awareness Month, we will lookback at how the online ... Awareness Best Practices Cybersecurity Oct 26, 2023 Newsletters
How to Keep Your Smart Home from Turning Against You Smart homes have become a ubiquitous part of modern living. It doesn’t even seem unusual anymore to tell your refrigerator to add milk to the digital grocery list. Smart homes offer unparalleled conve... Awareness Cybersecurity Managed Security Oct 5, 2023 Educational Articles