What is a Qualified Technology Executive, and Why Does Your Company Need One? The following webinar uses an example of browser hardening an example to understand why a technology executive is required. This is not a technical webinar for technical people. It is a webinar for bu... Cybersecurity M365 Managed Security Microsoft browser chrome edge hardening security Jun 19, 2024 Educational Articles
I.T. : THE NEXT FRONTIER Put your IT skills to the test. Booby-trapped chambers! Pits of despair! And most horrifying of all —a bunch of space heaters, all plugged into one surge protector! Welcome to Server Room of Doom — th... Best Practices Power Procurement Rack Strategy May 13, 2024 Educational Articles
Is Monitoring Telegram for Dark Web Data Worth It? A new place for threat actors When considering the need to look for client data, credentials, OSINT data, and more, the next place threat actors are operating and interfacing with others is Telegram. ... Password Security Strategy Apr 26, 2024 Educational Articles
The Effect of AI on Social Engineering As technology continues to evolve, so do the tools and tactics employed by cybercriminals. Historically, criminals have been early adopters of new tech. Artificial Intelligence (AI) has emerged as a g... AI Awareness Cybersecurity Data Privacy Hacking Phishing Social Engineering Dec 15, 2023 Educational Articles
Reducing Your Risk Profile - haveibeenpwned.com What is haveibeenpwned.com? A "breach" is an incident where data has been unintentionally exposed to the public. Haveibeenpwned.com is a website that aggregates information on data breaches. You can s... Awareness Cybersecurity Dark Web Data Breach Identity Security Privacy Dec 5, 2023 Educational Articles
How to prepare for a future with no online privacy In the United States, and internationally, there are various legislative efforts claiming protection of children, but which will seriously limit or negate the possibility of encrypting user uploaded c... Awareness Cybersecurity Data Privacy Industry Nov 7, 2023 Educational Articles
The Potential of Microsoft Clipchamp now Unlocked for Business Whether you're a content creator, a business owner, or simply someone who enjoys sharing moments with friends and family, having the right tools to edit and enhance your videos is essential. Microsoft... Microsoft Productivity Software Vendor Oct 30, 2023 Educational Articles
How to Keep Your Smart Home from Turning Against You Smart homes have become a ubiquitous part of modern living. It doesn’t even seem unusual anymore to tell your refrigerator to add milk to the digital grocery list. Smart homes offer unparalleled conve... Awareness Cybersecurity Managed Security Oct 5, 2023 Educational Articles
Why You Need to Understand "Secure by Design" Cybersecurity Practices Cybersecurity has become a critical foundation upon which many aspects of business rely. Whether you’re a large enterprise or small business, network security is a must. Cyberattacks can have long-ter... Best Practices Cybersecurity Security Strategy Oct 5, 2023
10 Biggest Cybersecurity Mistakes of Small Companies Cybercriminals can launch very sophisticated attacks. But it’s often lax cybersecurity practices that enable most breaches. This is especially true when it comes to small and mid-sized businesses (SMB... Awareness Best Practices Cybersecurity Hacking Managed Security Security Strategy Oct 5, 2023
Credential Stuffing Credential stuffing is one of the latest tactics that cybercriminals are employing to exploit vulnerabilities and gain unauthorized access to your personal information. Let’s take a look at what it is... Awareness Cybersecurity Passwords Sep 18, 2023
Defending Against SaaS Ransomware Software-as-a-Service (SaaS) has revolutionized the way businesses operate. It offers convenience, scalability, and efficiency. No more dragging software from one device to another. Everyone can colla... Backups Cybersecurity Ransomware Sep 7, 2023