Password

Factor in More Than Just the Keys to the Castle

Factor in More Than Just the Keys to the Castle

Nowadays, a password – no matter how formidable – just isn’t enough to protect the throne. With all the critical information we store online, Two-Factor Authentication adds an important security step to help your devices confirm that the person trying to log in is, well, you.

One Compromise Not to Make

One Compromise Not to Make

Picture this: You’re the finance manager at a fifty-person manufacturing firm. Your best customer’s account is overdue – unusual, as they typically pay in full. Your customer, however, insists they’ve already paid and presents proof from the bank. So why didn’t you receive the payment?

Business Email Compromise (BEC) has cost businesses over $12.5 billion since 2013,  and it’s a trend on the rise with a 136% increase in losses from 2016 to 2018.

There’s A Lot More in the Clouds than Snow

There’s A Lot More in the Clouds than Snow

Data Privacy Day is January 28th, and it’s a great opportunity to evaluate how you handle and store your company’s sensitive data. Cloud storage is a very popular method: 63% of small businesses use the cloud to store their company data and files, and that number appears to be on the rise. But as with most technology, it comes with risk. So what can you do to ensure that your – and your customers’ – data is kept private?

Making – And Keeping – Your Cybersecurity Resolution

Making – And Keeping – Your Cybersecurity Resolution

We all know the drill by now: the beginning of the year is a fresh start, and the perfect time to set a goal. 40% of Americans make a New Year’s resolution each year, and whether that’s sticking to a budget, finding a new hobby, or getting more exercise, they don’t waste a minute making that goal a reality.

This time of year, the gyms are packed – but don’t let that discourage you! You can increase your cyber-strength from the comfort of your desk chair.