Tag Archive for: IT Security

How to Use the SLAM Approach to Improve Phishing Detection Skills

,
Phishing just never seems to go away and remains the most dangerous threat to company networks. Phishing relies on the ability of the message to trick the user, and this is unfortunately easily done in many cases. Employees continue to…

Safe Holiday Shopping Tips to Promote to Your Employees

,
The holiday season has officially arrived, and online shopping is the sport of the season. It’s important for employers to address safe holiday shopping with their teams, even if this seems like more of a personal subject than corporate.…

Ideas for End of the Year IT Upgrades to Reduce Your 2021 Taxes

, ,
Any time of year is good to do IT upgrades that can help your business remain productive and improve your capabilities. But doing them at the end of the year provides a little extra incentive. Paybacks through tax deductions that you can…

October is Cybersecurity Awareness Month – Get Tips & Free Resources for Your Staff Training

,
Trying to come up with fresh cybersecurity awareness content for your employees can be challenging. It’s not something that is usually high on the priority list for companies, yet it’s important to continue to drive home the message…

Is Shadow IT Use Getting Out of Hand? Here’s How to Fix It

, ,
Do you know all the apps your employees are using? It’s become harder for companies to keep unauthorized cloud use under control due to the increase in work-from-home (WFH) staff. When working from home, employees are often using their…

Why You Need to Think Twice Before Changing a Mobile Phone Number

, ,
Approximately 97% of U.S. adults own a cell phone. The 2020 Census states that there are approximately 258.3 million adults in the U.S., which equates to a whole lot of mobile numbers for carriers to keep track of. When it comes to company-owned…

40% of Security Pros Say Mobile Devices Are the #1 Threat to Businesses (Learn Why!)

,
While businesses were laser-focused on securing computers and servers, devoting much of their IT security budgets to protecting them from a breach, mobile devices have become a major threat. The rise of business cloud apps and mobile device…

What Important Lessons Can Be Learned from the Ransomware Attacks on Colonial Pipeline & JBS?

,
The massive gas shortages caused by the ransomware attack on Colonial Pipeline have gone away, but the rise in gas prices is still being felt around the country. When Colonial Pipeline was hit with ransomware on May 7th, the pipeline that…

Firmware Attacks Have Increased 5X in 4 years! Protective Steps You Should Take

,
Attacks on firmware have been increasing steadily, more than doubling each year over the last four years. It used to be one of those areas of a system that hackers didn’t pay a lot of attention to. However, as more high-profile firmware…

4 Ways to Use Encryption to Improve Data Security

,
When you’re building your layers of cybersecurity, you need to consider several different protections, beyond the most obvious.