Phishing Scams Are Skyrocketing – What Companies Should Do

Phishing scams were up as much as 667% by the end of March, with most scams targeting personal email accounts. By April 22, Google reported having detected 18 million COVID-19 malware and phishing Gmail messages per day.  Scammers are taking full advantage of fear, distraction, and disorientation right now. Fraudsters know you’re at home using your …

Read more

MFA During COVID-19: Eight Ways To Be More Secure

Multifactor authentication (MFA) is more important than ever when everyone is working remotely — no more walking down the hall to ask a question. This is a massive change for most organizations. It’s critical to take steps to verify identities before allowing access to your network or data. As a reminder, MFA consists of three …

Read more

Someone Stole My Company Laptop! Now What?

When your company laptop goes missing, it’s time to leap into action! Whether it was stolen from your car, disappeared in the airport security line, or was physically wrenched from your hands in a grab-and-run, these seven steps apply: 1. Call your IT department or your company IT service provider. They need to know as …

Read more

5-Phase Strategy For Launching Your IT Security Program

If your organization is ready to get your IT security on track, where do you start? Too little security opens up your organization to unnecessary risk and too much security interferes with productivity. Here’s a five-phase checklist to help guide you through the process of launching your IT security program: Phase 1: Choose a pre-prepared checklist or assessment For …

Read more

Zero-Trust Model for IT Security: 3 Reasons Your Business Needs To Be Ready

To stay on the curve with IT security, your organization’s thinking needs to continually evolve. Threats keep changing and coming at you faster and from more directions. While protecting your IT perimeter has long been the way to go, new challenges, including cloud computing and the ability for employees (and others) to access your data …

Read more

How To Build a Secure IT Fort: The 7 Layers of Cybersecurity Your Business Needs To Manage Now

If your business has a traditional IT environment or a hybrid environment that blends a traditional IT environment with cloud services, it helps to think about protecting it like you would protect a fort. Don’t let the bad guys come over your walls! Here’s how to fortify your IT traditional ecosystem to stave off breaches, …

Read more