12 Ways To Know If Your Business Has Been Breached

Determining whether or not your business has been breached is one of the toughest tasks in the IT universe. Skilled hackers are great at finding vulnerabilities, being patient, covering their tracks and not raising suspicions. They can spend a lot of time in your network looking around and often steal information a little at a …

Read more

High Availability, Disaster Recovery and Business Continuity: What’s the Difference?

If you think your company is ready for a disaster because you backup every day, or that you don’t need to back up because you have highly redundant servers or storage, think again! High availability, disaster recovery and business continuity planning are separate yet interconnected aspects of your IT ecosystem. Here’s an overview of the …

Read more

No False Alarms! Emergency Communications as Part of Your Disaster Recovery Plan

Hawaii’s false alarm incident earlier this year was a teachable moment for organizations — how prepared is yours when it comes to emergency communications? While you’re probably not responsible for notifying an entire state about an incoming attack, you are responsible for telling stakeholders what’s going on if there’s an emergency. Emergency communications as part …

Read more

Tax Time Means Fraud Time: Train Employees To Spot (and Stop) Scams

February 2018: Every year there’s a flurry of activity surrounding taxes — forms to collect, information to gather, people to contact — that are outside of normal day-to-day operations. This is catnip to scammers. To protect your organization (and employees, partners, and vendors) against fraud, train your employees how to spot a tax scam and …

Read more

What You Need To Know About Enhanced Email Security

December 2017: With 90% of all cyber attacks originating from email, it’s time for your organization to step up its email security game. The latest spam filters alone aren’t enough protection. Today’s most dangerous threats come from spear phishing scams that circumvent filters. The best next-generation email security is smart — literally. It goes beyond …

Read more

Top 7 Reasons To Prioritize Security Awareness Training

What’s the single most important thing you can do to protect your business from cybercrime? Have good firewalls and anti-malware? It’s actually more analog than that — it’s training your employees to spot and react to scams. All the advanced perimeter technology in the world won’t help if your employees inadvertently hand criminals the keys. …

Read more

Data Encryption and Multi-factor Authentication: 5 Facts You Can’t Ignore

November 2017: When it comes to cybersecurity, there are two things your organization needs to be doing right now — multi-factor authentication (MFA) and data encryption. Hackers have become too sophisticated to be stopped by yesterday’s security policies. Implementing encryption or MFA (or both) may not be as easy as flipping a switch but it’s …

Read more

Equifax Trickle-Down: Why Enterprises Will Boot Their Weak-Link Partners

October 2017: The ripple effects of the Equifax breach are spreading far and oh so wide, all the way to possibly impacting the companies that your organization can do business with. Due to increased cybersecurity concerns, enterprises are poised to require their vendors and partners meet the same cybersecurity requirements that they must meet themselves …

Read more