What is a Qualified Technology Executive, and Why Does Your Company Need One? The following webinar uses an example of browser hardening an example to understand why a technology executive is required. This is not a technical webinar for technical people. It is a webinar for bu... Cybersecurity M365 Managed Security Microsoft browser chrome edge hardening security Jun 19, 2024
The Effect of AI on Social Engineering As technology continues to evolve, so do the tools and tactics employed by cybercriminals. Historically, criminals have been early adopters of new tech. Artificial Intelligence (AI) has emerged as a g... AI Awareness Cybersecurity Data Privacy Hacking Phishing Social Engineering Dec 15, 2023
Reducing Your Risk Profile - haveibeenpwned.com What is haveibeenpwned.com? A "breach" is an incident where data has been unintentionally exposed to the public. Haveibeenpwned.com is a website that aggregates information on data breaches. You can s... Awareness Cybersecurity Dark Web Data Breach Identity Security Privacy Dec 5, 2023
How to prepare for a future with no online privacy In the United States, and internationally, there are various legislative efforts claiming protection of children, but which will seriously limit or negate the possibility of encrypting user uploaded c... Awareness Cybersecurity Data Privacy Industry Nov 7, 2023
How to Keep Your Smart Home from Turning Against You Smart homes have become a ubiquitous part of modern living. It doesn’t even seem unusual anymore to tell your refrigerator to add milk to the digital grocery list. Smart homes offer unparalleled conve... Awareness Cybersecurity Managed Security Oct 5, 2023
Why You Need to Understand "Secure by Design" Cybersecurity Practices Cybersecurity has become a critical foundation upon which many aspects of business rely. Whether you’re a large enterprise or small business, network security is a must. Cyberattacks can have long-ter... Best Practices Cybersecurity Security Strategy Oct 5, 2023
10 Biggest Cybersecurity Mistakes of Small Companies Cybercriminals can launch very sophisticated attacks. But it’s often lax cybersecurity practices that enable most breaches. This is especially true when it comes to small and mid-sized businesses (SMB... Awareness Best Practices Cybersecurity Hacking Managed Security Security Strategy Oct 5, 2023
Credential Stuffing Credential stuffing is one of the latest tactics that cybercriminals are employing to exploit vulnerabilities and gain unauthorized access to your personal information. Let’s take a look at what it is... Awareness Cybersecurity Passwords Sep 18, 2023
Defending Against SaaS Ransomware Software-as-a-Service (SaaS) has revolutionized the way businesses operate. It offers convenience, scalability, and efficiency. No more dragging software from one device to another. Everyone can colla... Backups Cybersecurity Ransomware Sep 7, 2023
Does Your Business Have Any Cybersecurity Skeletons in the Closet? Let’s dive into a topic that might give you the chills—cybersecurity skeletons in the closet. You may not have old skeletons hidden away in the basement. But there’s a good chance of cybersecurity vul... Best Practices Cybersecurity Sep 7, 2023
12 Ways to Protect Against a Ransomware Attack ... Best Practices Cybersecurity Ransomware Aug 18, 2023
When IT Admins Go Bad Listen to Felicia's podcast episode Your browser does not support the audio element. Several examples of when IT admins go bad. I talk about steps you need to take to ensure that a bad IT admin doesn'... Best Practices Cybersecurity Insider Threats Security Strategy Aug 10, 2023