A Majority of Ransomware Attacks Are Coming From RaaS. Learn Why & What You Can Do

One of the biggest stories in cybersecurity over the last year has been the rise of ransomware. Unfortunately, these types of attacks have become more and more dangerous as of lately, due to the increased volume of attacks being made, increase…

5 Best Practices for Implementing an Effective MFA Strategy

Bad password habits are extremely common. Unfortunately, they are often the cause of data breaches or cloud account takeovers. People have so many passwords to juggle that they often use weak passwords, store passwords using non-secure…

What is Cloud Jacking & Why Should You Worry About It?

,
It’s estimated that 82% of the company workload is now cloud-based. Cloud adoption has been on a steady uptick for over a decade and has been accelerated by the pandemic, which required many companies to adjust to fully remote teams.…

Top Things You Need to Know to Prepare for an Upgrade to Windows 11

,
With Windows 10 more than halfway through its lifecycle, Microsoft has announced the upcoming release of Windows 11. Any time there is a major upgrade, such as a new OS, there is planning that needs to be done in advance so companies have…

4 Reasons You Should Consider a 3rd Party Mail Filter

,
Email is still one of the most used business apps, with employees spending an average of 28% of their day in their email program. It’s the preferred method of communication and is still used widely internally, despite the rise of messaging…

Why Does Phishing Work & Why Is It So Effective?

,
Phishing has been around nearly as long as email itself. It began with those “Nigerian Prince” style emails that promised someone a big reward if they just sent a little money to help out a prince. While those emails still circulate,…

5 New Features for Teams Video Meetings That Will Make You Want to Switch

,
Video has become the default meeting mode since the beginning of the pandemic. We’ve become acutely used to “zooming” and the unfortunate issues that arise with unsecured meetings and frozen sound or video. Before the pandemic, the…

40% of Security Pros Say Mobile Devices Are the #1 Threat to Businesses (Learn Why!)

,
While businesses were laser-focused on securing computers and servers, devoting much of their IT security budgets to protecting them from a breach, mobile devices have become a major threat. The rise of business cloud apps and mobile device…

Why the New Google Photo Policy Might Make You Rethink Your Cloud Storage Situation

,
A recent change in the high-quality photo unlimited storage policy of Google Photos has users scrambling to figure out what to do about photo and video storage. On June 1, 2021, the service ended its unlimited storage policy. Any high-quality…

What Important Lessons Can Be Learned from the Ransomware Attacks on Colonial Pipeline & JBS?

,
The massive gas shortages caused by the ransomware attack on Colonial Pipeline have gone away, but the rise in gas prices is still being felt around the country. When Colonial Pipeline was hit with ransomware on May 7th, the pipeline that…