Data Privacy Trends in 2023 That Could Impact Your Compliance Data privacy is critical as more personal information is shared online. Compliance with regulations like GDPR is essential for most companies. Even small businesses must prioritize data privacy as it’s linked to cybersecurity. GDPR violations and associated fines are rising,… Read More
Is That Really a Text from Your BOSS? Beware of gift card scams! Scammers are using texts and emails to trick employees into buying gift cards for urgent situations. Once the employee sends the card numbers back, they find out it was a phishing scam and they’re out… Read More
Major Microsoft 365 MFA changes Microsoft will begin to deploy number matching MFA starting February 27. Multifactor authentication is a simple and powerful way to protect your online accounts from hacking attempts. With multifactor authentication, you need to provide more than just a password to… Read More
Hive ransomware gang, which has extorted more than $100 million from its growing list of victims. Hive is a double-extortion ransomware group that first appeared in June 2021. Over the past 18 months our security partners are reporting a significant increase in activity across healthcare, education, charity, and the public sectors.… Read More
What to Include in a Year-end Technology Infrastructure Review When the year is coming to a close, it’s the perfect time to plan for the future. Most businesses begin the year with the hope of growing and improving operations. Much of how a business operates depends on technology. So,… Read More
9 Urgent Cybersecurity Tips for Online Shopping With the Christmas shopping season taking off. This means that scammers have also revved up their engines. They’re primed and ready to take advantage of all those online transactions. Don’t forget to stay safe online during the buying frenzy that… Read More
How Using the SLAM Method Can Improve Phishing Detection There is a reason why phishing is usually at the top of the list for cybersecurity awareness training. For the last decade or two, it has been the main delivery method for all types of attacks. Ransomware, credential theft, database… Read More
What Should You Do to Reduce Risk When Your Mobile Device Goes Missing? Few things invoke instant panic like a missing smartphone or laptop. These devices hold a good part of our lives. This includes files, personal financials, apps, passwords, pictures, videos, and so much more.… Read More
The Biggest Vulnerabilities that Hackers are Feasting on Right Now Software vulnerabilities are an unfortunate part of working with technology. A developer puts out a software release with millions of lines of code. Then, hackers look for loopholes that allow them to breach a system through that code. The developer… Read More