Tag Archive for: CyberSecurity

How to Use the SLAM Approach to Improve Phishing Detection Skills

,
Phishing just never seems to go away and remains the most dangerous threat to company networks. Phishing relies on the ability of the message to trick the user, and this is unfortunately easily done in many cases. Employees continue to…

6 Questions You’ll Need to Answer If Applying for Cybersecurity Insurance

,
The cybersecurity landscape seems to get more dangerous every year. Besides having to deal with a COVID-pandemic over the last 18+ months, there has also been a cyber pandemic. That pandemic has included an increase in cloud account attacks…

October is Cybersecurity Awareness Month – Get Tips & Free Resources for Your Staff Training

,
Trying to come up with fresh cybersecurity awareness content for your employees can be challenging. It’s not something that is usually high on the priority list for companies, yet it’s important to continue to drive home the message…

Is Shadow IT Use Getting Out of Hand? Here’s How to Fix It

, ,
Do you know all the apps your employees are using? It’s become harder for companies to keep unauthorized cloud use under control due to the increase in work-from-home (WFH) staff. When working from home, employees are often using their…

Why You Need to Think Twice Before Changing a Mobile Phone Number

, ,
Approximately 97% of U.S. adults own a cell phone. The 2020 Census states that there are approximately 258.3 million adults in the U.S., which equates to a whole lot of mobile numbers for carriers to keep track of. When it comes to company-owned…

Should You Consider Moving to the New Windows 365 Cloud PCs?

The concept of virtual PCs has been around for a while, but it’s never really taken off. That might change post-pandemic now that the hybrid workforce has become the norm. Before the pandemic, 47% of U.S. workers never worked remotely.…

A Majority of Ransomware Attacks Are Coming From RaaS. Learn Why & What You Can Do

One of the biggest stories in cybersecurity over the last year has been the rise of ransomware. Unfortunately, these types of attacks have become more and more dangerous as of lately, due to the increased volume of attacks being made, increase…

5 Best Practices for Implementing an Effective MFA Strategy

Bad password habits are extremely common. Unfortunately, they are often the cause of data breaches or cloud account takeovers. People have so many passwords to juggle that they often use weak passwords, store passwords using non-secure…

What is Cloud Jacking & Why Should You Worry About It?

,
It’s estimated that 82% of the company workload is now cloud-based. Cloud adoption has been on a steady uptick for over a decade and has been accelerated by the pandemic, which required many companies to adjust to fully remote teams.…

4 Reasons You Should Consider a 3rd Party Mail Filter

,
Email is still one of the most used business apps, with employees spending an average of 28% of their day in their email program. It’s the preferred method of communication and is still used widely internally, despite the rise of messaging…