Third-party Vendors Risk: 6 Steps To Protect Your Business

(UPDATED) One of the most important things we’ve learned from the SolarWinds hack is organizations need to include all software and apps in their inventories of third-party vendors. Historically, third-party vendors have been a primary risk when it comes to data breaches — they’re often the weakest link in the chain of protection. Third-party vendors …

Read more

Single Sign-on — 3 Reasons Every Company Should Use It

How many platforms and apps do your employees use? Typically, employees use a dozen or more to get their work done. If they have to log in to each one separately — then log in again when apps become idle — it slows them down and opens your organization to risk. User credentials are portals …

Read more

Phishing Scams Are Skyrocketing – What Companies Should Do

Phishing scams were up as much as 667% by the end of March, with most scams targeting personal email accounts. By April 22, Google reported having detected 18 million COVID-19 malware and phishing Gmail messages per day.  Scammers are taking full advantage of fear, distraction, and disorientation right now. Fraudsters know you’re at home using your …

Read more

MFA During COVID-19: Eight Ways To Be More Secure

Multifactor authentication (MFA) is more important than ever when everyone is working remotely — no more walking down the hall to ask a question. This is a massive change for most organizations. It’s critical to take steps to verify identities before allowing access to your network or data. As a reminder, MFA consists of three …

Read more

Is Your Organization Ransomware-Ready?

Ransomware is a four-letter word, just with extra letters. It’s more sophisticated and strategic in 2020, with cybercriminals targeting organizations instead of consumers to get higher ransom payments. Attacks on organizations increased as much as 363% last year and unprepared organizations pay a price that’s not financial. Lost productivity and the time and resources it …

Read more

Someone Stole My Company Laptop! Now What?

When your company laptop goes missing, it’s time to leap into action! Whether it was stolen from your car, disappeared in the airport security line, or was physically wrenched from your hands in a grab-and-run, these seven steps apply: 1. Call your IT department or your company IT service provider. They need to know as …

Read more

IT Leaders: 9 Things To Expect When Recovering From Ransomware

One of the things that can get lost in discussions about ransomware is the work it takes to recover from an attack. Depending on which devices have been affected and how many of them, the task of cleaning up and getting things back to normal can take many, many work hours. And dollars. Here’s what …

Read more

Scary Stats Driving CIOs To Spend More on Cybersecurity

Numbers don’t lie. So, based on the numbers of reported cyber attacks, CIOs are spending more of their IT budgets on cybersecurity. The likelihood that a company will be attacked combined with what it costs to recover from the attack — both in dollars and reputation — is too high to ignore. Take a look …

Read more

8 Ways To Stay Off (Or Secure) Email So That Hackers Can’t Get It

Email is basically the same as it’s been since the ’80s. It was never meant to be totally private, and the available add-ons and security features are far from foolproof. But despite these flaws and others, it’s still the go-to because we’re all busy. Here are eight ways you (and your business) can replace your …

Read more

How Can We Help?
close slider
Send this to a friend