2 min read
To Keep Your Network Secure, Use Multi-factor Authentication 100% of the Time
Curious how most cyber-criminal hackers gain access to enterprise networks? It’s simple: they steal or guess usernames and passwords.
Read More2 min read
Curious how most cyber-criminal hackers gain access to enterprise networks? It’s simple: they steal or guess usernames and passwords.
Read More1 min read
We’re over a year into the COVID-19 global pandemic, and the million-dollar question remains: is remote work here to stay? It’s a great question and...
2 min read
A massive cyberattack targeted the Arizona City of Kingman’s technology infrastructure in early March. While categorized by officials as a “criminal...
1 min read
In the ever-changing and competitive marketplace (Thank you global pandemic!), gaining and maintaining buyers for your products or services is more...
1 min read
We talked about the concept of offboarding earlier this week on our blog. Why is it so important? Two words: risk & exposure.
2 min read
We’ve all experienced or facilitated the process when a company onboards you (as an employee) or you (as an employer) are onboarding a new employee.
1 min read
Cybersecurity trends can teach us to learn from past mistakes. They can predict future problems and can enable us to be better prepared for future...
2 min read
When it comes to out-of-date applications, please don’t ignore them. While Adobe’s Flash Player officially hit its end of life on January 1, 2021....
2 min read
It’s safe to say that law firms see their IT as mission-critical to their success. A simplified breakdown of IT for a firm could be described as —...
1 min read
When it comes to phishing attacks, a few techniques are most commonly used to attack PCs. Data from cybersecurity company Proofpoint analyzed...