Hacker looking forward at words describing corporate data

Neglecting MFA: The Scary Reality of Your Business Risk

Neglecting MFA: The Scary Reality of Your Business Risk IT security is more important than ever. Cyber-attacks and data breaches are a daily occurrence, they just don’t all make headlines. Businesses that fail to take proactive security measures put not only themselves at risk, but their customers too. One of today’s foundational security measures is… Read more »

Email Safety | 5 Ways to Spot a “Phishy” Email

Email Safety | 5 Ways to Spot a “Phishy” Email Quick Tips & Best Practices We rely on email for many functions of business today. This makes it an excellent tool for bad actors to exploit. Email is one of the quickest and easiest opportunities threat actors have at their disposal. Threat actors have gotten… Read more »

Reframing your approach to IT security decisions in 2022

Reframing your approach to IT security decisions in 2022 By Sean Gill, vCIO  The IT Security landscape has shifted over the past couple of years. In an article from MIT Technology Review, it is reported that in 2021, more zero-day vulnerabilities were released than in the past 10 years. This number nearly doubled the number… Read more »

Understanding The Enemy + Why Your Antivirus Isn’t Enough

  Understanding The Enemy + Why Your Antivirus Isn’t Enough By Russ Levanway, President You probably saw a dominant story in the news a couple of months ago about a major fuel shortage across the eastern seaboard. The pipeline that provides almost half the oil to the northeast and south came under a cyber-attack. Gas… Read more »

Ditch the Drama: 5 Ways to Stay Ahead of The Hackers

  Ditch the Drama: 5 Ways to Stay Ahead of The Hackers By Russ Levanway, President Ransomware attacks are getting to the point where they are becoming existential threats to organizations and can disrupt entire industries and supply chains.  If it wasn’t serious before, it is now.  Furthermore, hackers are increasingly sophisticated and daring, and… Read more »

Why COVID-Induced Work From Home is Open Season For Hackers

Why COVID-Induced Work From Home is Open Season For Hackers By Russ Levanway, President Working from home has become a new norm for many of us, and it looks like it will be for some time. Just last week, Google announced that it won’t require employees to return to the office until next summer, a… Read more »

Dangers of Phishing

By David Ashamalla, Director of Security Operations What is Phishing? Phishing (pronounced: “Fishing”) is the art of sending emails under a false name (misrepresenting the actual sender) in order to trick an end user into voluntarily giving up personal information, running a program, or granting access to funds.  These attacks are frequent, and take advantage… Read more »

What is Two Factor Authentication?

By David Ashamalla, Director of Security Operations Most everyone is familiar with using a username and password to sign in to services online. This typical sign in method is known as “single sign on”. The security with this is moderate since there is only one requirement you must satisfy to be given access. Two factor… Read more »

We’re under attack! Because of a computer screen?

By John Lim, CTO Over the weekend, the residents of Hawaii got some crazy alerts about a missile that had launched. People were in a panic…but it was a false alarm. How can clicking one button immediately send out an alert like this, causing a state-wide panic, with no precautions in place and no “false alarm”… Read more »

Do this One Thing to Make 2018 the Safest Year Yet

By Russ Levanway, CEO At the beginning of this year, I predicted trends for 2017 and discussed my single biggest concern: security. I talked about the changing security landscape and how crypto-ransomware is a real force to reckon with. Sadly, my predictions turned out to be true.