Security Topic: Data Protection

Security Topic: Data Protection

Is there any organization with sensitive data that someone else isn’t trying to collect? We create processes, methodologies, and technical know-how. Even if we don’t have secret source-code or a cool product with intellectual property, every organization maintains...

read more
Cybersecurity working with IT?

Cybersecurity working with IT?

IT services are a crucial part of a business. Companies rely on managed service providers (MSPs) to ensure a host of operations such as email, file access, computer upgrades, software updates, anti-malware, anti-virus.... the list goes on. However, just because...

read more
Gone Phishing

Gone Phishing

100+ billion spam emails are sent each day, and 90% of successful breaches start with phishing. "What is phishing?" you might ask. It's the fraudulent practice of sending emails that seem to be from individuals you know or reputable companies to entice you to reveal...

read more
What Cybersecurity Framework Are You Using?

What Cybersecurity Framework Are You Using?

Today’s headlines are full of cautionary tales of companies (and individuals for that matter) falling victim to cyber crime. Some incidents are very sophisticated; others not so much. Some companies are large; others are small. Some had prepared and defended, while...

read more
Cybersecurity Predictions for 2022

Cybersecurity Predictions for 2022

According to The Washington Post, just under $1 trillion was lost globally in 2020 in cyber-attacks[i].  While many attackers have a directive, most are just scanning the world looking for opportunities.  It appears they are still very successful in their efforts. As...

read more