Is There a Right Way to Set Up Two-Factor Authentication?

Lately, there's been a lot of chatter around two-factor authentication (2FA) and multi-factor authentication (MFA). We're seeing more and more websites and applications enforcing 2FA—like Google recently announcing 2FA will be turned on by default for all accounts. But that led us to wonder: How easy is it for malicious threat actors to circumvent 2FA?

Read more

What is Ransomware?

Ransomware is everywhere. In 2021, ransomware was involved in at least 10% of breaches. Businesses in Healthcare, Financial Services, and Professional/Legal Services are consistently on the list of "most at risk" of ransomware attacks. So what is ransomware? What are the specifics that we as businesses need to understand to educate ourselves and our organizations on this imminent risk?

Read more

Making Sense of Alphabet Soup

Let’s be honest, the cybersecurity marketplace is complex and confusing. Businesses are already struggling to make sense of security and defend themselves from modern attackers. It doesn’t help that they are also drowning in a sea of acronyms and jargon while doing it. MDR, EDR, NGAV, SIEM, the list goes on and it can feel like you’re staring at a bowl of alphabet soup.To help you make sense of today's complex security landscape, we've defined the key acronyms and capabilities that can be found in several of today's most crucial security categories.

Read more

Malicious Android App Infects 100,000

Have you ever downloaded a fun app to your phone that allows you to edit your photo into an avatar, meme, or possibly a cartoon? If so, you probably didn’t even think twice about it. Many of us trust that the Apple Store or Google Play Store has vetted all of the apps for sale and trust that they are safe. Unfortunately, that is not the case, and recently there was an app on the Google Play store that installed malware and stole over 100,000 users’ Facebook passwords. Were you a victim?

Read more

Balancing The Scales of Cybersecurity and Insurance

Small and medium businesses (SMBs) are facing a reckoning now. Insurance companies are forcing many to get proper security measures in place, or they risk not being insured. But how did it come to this? Over the years, cybersecurity insurance has paid out billions in claims from malware and other attacks bringing businesses to their knees. As these attacks became more frequent and more targeted, it became costlier and more likely that insurance companies would have to pay out claims because companies were, and always will be, vulnerable to attack. Insurance companies have introduced a few new tools to lower their risk of paying out on losses due to cybersecurity incidents. And some of these tools have affected how the industry couples cybersecurity and insurance.

Read more

Why Persistence Is a Staple For Today's Hackers?

Chances are that you lock your doors as you leave your house to prevent any unwanted visitors from entering while you’re gone. Although it isn’t foolproof, locking your doors presents a challenge for strangers without authorized access to enter. As a result of your efforts, an unwanted visitor—such as a burglar—would need to jump through a few hoops to enter your house.

Read more

Still Experiencing "Zoom Fatigue?"

A little over a year ago, we started hearing the term "Zoom Fatigue," that referenced the extreme exhaustion from virtual meetings.  Many of us are still using virtual meetings reasonably consistently, and I can guess that all of us are tired of seeing our own faces during these calls. Not only is it exhausting and extremely distracting watching your own face throughout a meeting, but many times, we look very unnatural because of the orientation of our eyes since it is challenging not to watch ourselves. Luckily, Microsoft has an answer.

Read more

Recent Posts

20 Critical Questions You Must Ask Before Hiring any IT Company