What is Phishing & How Are Hackers Using It?

What is Phishing & How Are Hackers Using It?

While the number of people falling for sending personal information to the crown prince of Nigeria in hopes of receiving his promised wealth and riches seems to be dropping, phishing remains a major issue. In fact, the number of phishing campaigns pursued by hackers...
Fixing Your Weakest Link: Your Employees

Fixing Your Weakest Link: Your Employees

You can have every piece of security hardware in the books: firewall, backup disaster recovery device, anti-virus; but your employees will still be the biggest vulnerability in your organization when it comes to phishing attacks. How do you mitigate as much risk as...
Compliance Alphabet Soup

Compliance Alphabet Soup

No matter what industry you’re in, compliance acronyms are abundant, filling your days with both confusion and regulation. We call it the compliance alphabet soup. It’s time to make a little bit more sense of all those acronyms and what they likely mean for your...
4 easy steps to protect yourself from ransomware

4 easy steps to protect yourself from ransomware

1. Make sure everything is up-to-date and patched to the most recent version Ransomware searches for vulnerabilities in your software and operating system to find a way in and carry out its malicious plans. The WannaCry ransomware discovered a security hole in the...