Lately, there's been a lot of chatter around two-factor authentication (2FA) and multi-factor authentication (MFA). We're seeing more and more websites and applications enforcing 2FA—like Google recently announcing 2FA will be turned on by default for all accounts. But that led us to wonder: How easy is it for malicious threat actors to circumvent 2FA?
on Tuesday, 03 May 2022 Posted in Cybersecurity, Online Security, Business Tips, Security, Blog
Read moreRansomware is everywhere. In 2021, ransomware was involved in at least 10% of breaches. Businesses in Healthcare, Financial Services, and Professional/Legal Services are consistently on the list of "most at risk" of ransomware attacks. So what is ransomware? What are the specifics that we as businesses need to understand to educate ourselves and our organizations on this imminent risk?
on Monday, 25 April 2022 Posted in Cybersecurity, Data Security, Online Security, Business Tips, Technology, Blog
Read moreLet’s be honest, the cybersecurity marketplace is complex and confusing. Businesses are already struggling to make sense of security and defend themselves from modern attackers. It doesn’t help that they are also drowning in a sea of acronyms and jargon while doing it. MDR, EDR, NGAV, SIEM, the list goes on and it can feel like you’re staring at a bowl of alphabet soup.To help you make sense of today's complex security landscape, we've defined the key acronyms and capabilities that can be found in several of today's most crucial security categories.
on Tuesday, 12 April 2022 Posted in Cybersecurity, Data Security, Online Security, Business Tips, Data, IT Solutions, mobile security, Technology, Blog
Read moreHave you ever downloaded a fun app to your phone that allows you to edit your photo into an avatar, meme, or possibly a cartoon? If so, you probably didn’t even think twice about it. Many of us trust that the Apple Store or Google Play Store has vetted all of the apps for sale and trust that they are safe. Unfortunately, that is not the case, and recently there was an app on the Google Play store that installed malware and stole over 100,000 users’ Facebook passwords. Were you a victim?
on Monday, 28 March 2022 Posted in Cybersecurity, Online Security, mobile security, Blog
Read moreSmall and medium businesses (SMBs) are facing a reckoning now. Insurance companies are forcing many to get proper security measures in place, or they risk not being insured. But how did it come to this? Over the years, cybersecurity insurance has paid out billions in claims from malware and other attacks bringing businesses to their knees. As these attacks became more frequent and more targeted, it became costlier and more likely that insurance companies would have to pay out claims because companies were, and always will be, vulnerable to attack. Insurance companies have introduced a few new tools to lower their risk of paying out on losses due to cybersecurity incidents. And some of these tools have affected how the industry couples cybersecurity and insurance.
on Tuesday, 22 March 2022 Posted in Cybersecurity, Data Security, Online Security, Disaster Recovery, Business Tips, Security, Blog
Read moreChances are that you lock your doors as you leave your house to prevent any unwanted visitors from entering while you’re gone. Although it isn’t foolproof, locking your doors presents a challenge for strangers without authorized access to enter. As a result of your efforts, an unwanted visitor—such as a burglar—would need to jump through a few hoops to enter your house.
on Tuesday, 18 January 2022 Posted in Cybersecurity, Online Security, Business Tips, IT Solutions, Blog
Read moreA little over a year ago, we started hearing the term "Zoom Fatigue," that referenced the extreme exhaustion from virtual meetings. Many of us are still using virtual meetings reasonably consistently, and I can guess that all of us are tired of seeing our own faces during these calls. Not only is it exhausting and extremely distracting watching your own face throughout a meeting, but many times, we look very unnatural because of the orientation of our eyes since it is challenging not to watch ourselves. Luckily, Microsoft has an answer.
on Tuesday, 11 January 2022 Posted in Business, Business Tips, Productivity Tips, Blog
Read more