Article

Stay in Touch With Your Vulnerabilities

Stay in Touch With Your Vulnerabilities

It’s Valentine’s Day, what better time to talk about our vulnerabilities? Don’t worry, we won’t get into analyzing your love life, rather it’s your network and systems our heart is after.

Your network and firewall are often the first line of defense against cyberattacks, and one of the first things cybercriminals do is look for common vulnerabilities.

One Compromise Not to Make

One Compromise Not to Make

Picture this: You’re the finance manager at a fifty-person manufacturing firm. Your best customer’s account is overdue – unusual, as they typically pay in full. Your customer, however, insists they’ve already paid and presents proof from the bank. So why didn’t you receive the payment?

Business Email Compromise (BEC) has cost businesses over $12.5 billion since 2013,  and it’s a trend on the rise with a 136% increase in losses from 2016 to 2018.

The Best Defense is a Good Offense

The Best Defense is a Good Offense

Are you ready for the big game? The Super Bowl is a global phenomenon: over a hundred million people tuned in to cheer on their favorite team (or at least watch the ads) last year.

While the old adage “the best defense is a good offense” understandably rings true for football, in many ways the same can be said for cybersecurity.

There’s A Lot More in the Clouds than Snow

There’s A Lot More in the Clouds than Snow

Data Privacy Day is January 28th, and it’s a great opportunity to evaluate how you handle and store your company’s sensitive data. Cloud storage is a very popular method: 63% of small businesses use the cloud to store their company data and files, and that number appears to be on the rise. But as with most technology, it comes with risk. So what can you do to ensure that your – and your customers’ – data is kept private?