Email Safety | 5 Ways to Spot a “Phishy” Email

Email Safety | 5 Ways to Spot a “Phishy” Email Quick Tips & Best Practices We rely on email for many functions of business today. This makes it an excellent tool for bad actors to exploit. Email is one of the quickest and easiest opportunities threat actors have at their disposal. Threat actors have gotten… Read more »

Reframing your approach to IT security decisions in 2022

Reframing your approach to IT security decisions in 2022 By Sean Gill, vCIO  The IT Security landscape has shifted over the past couple of years. In an article from MIT Technology Review, it is reported that in 2021, more zero-day vulnerabilities were released than in the past 10 years. This number nearly doubled the number… Read more »

Understanding The Enemy + Why Your Antivirus Isn’t Enough

  Understanding The Enemy + Why Your Antivirus Isn’t Enough By Russ Levanway, President You probably saw a dominant story in the news a couple of months ago about a major fuel shortage across the eastern seaboard. The pipeline that provides almost half the oil to the northeast and south came under a cyber-attack. Gas… Read more »

Ditch the Drama: 5 Ways to Stay Ahead of The Hackers

  Ditch the Drama: 5 Ways to Stay Ahead of The Hackers By Russ Levanway, President Ransomware attacks are getting to the point where they are becoming existential threats to organizations and can disrupt entire industries and supply chains.  If it wasn’t serious before, it is now.  Furthermore, hackers are increasingly sophisticated and daring, and… Read more »

Why COVID-Induced Work From Home is Open Season For Hackers

Why COVID-Induced Work From Home is Open Season For Hackers By Russ Levanway, President Working from home has become a new norm for many of us, and it looks like it will be for some time. Just last week, Google announced that it won’t require employees to return to the office until next summer, a… Read more »

Dangers of Phishing

By David Ashamalla, Director of Security Operations What is Phishing? Phishing (pronounced: “Fishing”) is the art of sending emails under a false name (misrepresenting the actual sender) in order to trick an end user into voluntarily giving up personal information, running a program, or granting access to funds.  These attacks are frequent, and take advantage… Read more »

What is Two Factor Authentication?

By David Ashamalla, Director of Security Operations Most everyone is familiar with using a username and password to sign in to services online. This typical sign in method is known as “single sign on”. The security with this is moderate since there is only one requirement you must satisfy to be given access. Two factor… Read more »

We’re under attack! Because of a computer screen?

By John Lim, CTO Over the weekend, the residents of Hawaii got some crazy alerts about a missile that had launched. People were in a panic…but it was a false alarm. How can clicking one button immediately send out an alert like this, causing a state-wide panic, with no precautions in place and no “false alarm”… Read more »

Do this One Thing to Make 2018 the Safest Year Yet

By Russ Levanway, CEO At the beginning of this year, I predicted trends for 2017 and discussed my single biggest concern: security. I talked about the changing security landscape and how crypto-ransomware is a real force to reckon with. Sadly, my predictions turned out to be true.

The Service that Saved the Day When Kim Kardashian Broke the Internet

By Ruby Nahal, Senior Engineer It all starts in the cloud Cloud computing is the on-demand delivery of IT resources. This includes computing power, database storage, and applications through a cloud services platform via the internet. A Cloud services platform owns and maintains the physical servers, the network-connected hardware required for these application services and the… Read more »