Tag: IT / Cyber Security

Your Source for Business Technology Tips and News

Tag Archive: IT / Cyber Security

By:

Top IoT Trends to Look for in 2020

As the internet of things (IoT) revolution gains momentum, and our homes, devices, and workplaces become increasingly interconnected, what can we expect from the market in 2020? One certainty is that the potential is there for small and medium businesses…

By:

8 Tips for Detecting a Phishing Email

As email phishing tactics continue to increase in sophistication, fraudulent emails are looking more and more legitimate making it difficult for the average user to tell whether an email message is fraudulent or real. In this post we offer tips…

Contact Us

  • This field is for validation purposes and should be left unchanged.

By:

Email Security Strategy: Why Automated Security Awareness Training Is Critical

Computer-based training (CBT) for information security awareness is increasingly more important in the fight against today’s explosion of costly phishing and other social-engineering attacks, and while we all know that teaching folks how to spot and avoid malicious email is…

By:

5 Steps to Get Started Protecting Your Data

More than 1.9 billion records containing personal and other sensitive data were compromised between January 2017 and March 2019. That’s according to the latest EY Global Information Security Survey, and a sobering reminder why businesses of all sizes must act…

By:

Cybersecurity Best Practices: Strategies for IT, Legal & Insurance

Cyberattacks are not only on the rise, they hit businesses every day. The broadness of the scope of illegal access and the sophistication and diversity of threats aimed at unauthorized information access have skyrocketed. Phishing, Malware, Ransomware, Password Breaches, Denial…

By:

IT Security Best Practices: Quick Tips to Help Secure Your Network

Cyberattacks are on the rise. Phishing, Malware, Ransomware, Password Breaches & Denial of Service Attacks have changed in design and grown in complexity, so there’s no better time to refresh on some basic best practices to secure your network. Password…

By:

Stop Ransomware in its Tracks

“Oops, your files have been encrypted!” It’s a message nobody ever wants to see, yet it was what greeted workers in the UK’s National Health Service (NHS) in May 2017. This was the WannaCry (a.k.a. WannaCrypt or WannaCryptor 2.0) malware….

By:

Cybersecurity Outlook for 2019

We all know data is valuable, but too often we act as if it isn’t. Valuables are often secured – kept in safes, insured, treated with care. With valuable business and personal data moving around the internet all the time,…

By:

What the C-suite must know about IoT

In October 2016, a botnet of connected devices (or ‘things’) daisy-chained with the Mirai malware and knocked sites like Twitter, Spotify, and GitHub offline at various times. As we live in a world where more and more everyday devices –…

By:

Where CIOs Are Focusing Heading into 2019

Gartner’s latest annual CIO Agenda survey of more than 3,000 CIOs in 98 countries found that 95 per cent of CIOs expect digitalization to change their jobs. IT delivery is seen as a given, with the two-key transformation in the…

By:

CyberSecurity and Establishing a Cyber SMART Work Environment

With increasing cyber-attacks and threat of a cybersecurity breach to small and medium sized businesses, the need for education on cybersecurity has never been greater. The financial impact to small businesses from ransomware, phishing emails, and social engineering schemes are…

By:

Emerging Cybersecurity Threats: What You Need to Know

As a leader, you spend a considerable amount of time strategizing ways to grow your business. Unfortunately, criminal hackers spend just as much time scheming their next cyber-attack in an attempt to exploit all your hard work. With the growing sophistication of today’s cyber-attacks, it…

By:

10 Things to Know About GDPR

What does GDPR have to do with me? U.S. businesses may not realize that the new General Data Protection Regulation doesn’t just apply to organizations in the European Union. The truth of the matter is it applies to anyone handling…

By:

Securing Your BYOD Policy

Work practices have undergone a revolution in the digital age. Networked devices and more mobility have blurred the line between work and home as vast numbers of people perform their jobs across multiple platforms, often far from the office. An…

WordPress Image Lightbox Plugin