How To Stay In Compliance When Employees Work From Home — or From Anywhere

Your employees need to stay in compliance regardless of where they’re working. When employees Work From Home (WFH) or Work From Anywhere (WFA), the risk to your systems increases — breaches, malware, ransomware, device and network access, social engineering, the temptation to use workarounds, and other threats are more likely when people work away from …

Read more

The Kaseya Ransomware Attack, the Supply-Chain Threat, and What You Can Do

There has been a lot of news and some speculation about the ransomware attack on the Kaseya VSA software.  Here’s what’s happened so far. Cybercriminals exploited several vulnerabilities on Kaseya’s VSA on-premises product to attempt to install ransomware onto computers and servers managed by the Kaseya VSA. IT departments and MSPs use the VSA software …

Read more

Is Your Organization Ransomware-Ready?

(Updated) Ransomware is a gold mine for cybercriminals. It’s available on the dark web as-a-service, most businesses aren’t fully prepared to defend against it, and it can be monetized beyond the ransom demand by selling stolen data and using “name and shame” schemes. It’s no wonder we’re seeing an enormous spike — criminals are making …

Read more

The 2 Most Important Actions To Take After The SolarWinds Hack

We posed a series of questions to Leapfrog Services CTO Emmett Hawkins about what companies should do to improve their security posture after the SolarWinds hack. To recap what happened, late in 2020, a leading cybersecurity company named FireEye discovered it had been hacked and identified SolarWinds network-monitoring software as the source of the hack. …

Read more

Third-party Vendors Risk: 6 Steps To Protect Your Business

(UPDATED) One of the most important things we’ve learned from the SolarWinds hack is organizations need to include all software and apps in their inventories of third-party vendors. Historically, third-party vendors have been a primary risk when it comes to data breaches — they’re often the weakest link in the chain of protection. Third-party vendors …

Read more

Single Sign-on — 3 Reasons Every Company Should Use It

How many platforms and apps do your employees use? Typically, employees use a dozen or more to get their work done. If they have to log in to each one separately — then log in again when apps become idle — it slows them down and opens your organization to risk. User credentials are portals …

Read more

Phishing Scams Are Skyrocketing – What Companies Should Do

Phishing scams were up as much as 667% by the end of March, with most scams targeting personal email accounts. By April 22, Google reported having detected 18 million COVID-19 malware and phishing Gmail messages per day.  Scammers are taking full advantage of fear, distraction, and disorientation right now. Fraudsters know you’re at home using your …

Read more

MFA During COVID-19: Eight Ways To Be More Secure

Multifactor authentication (MFA) is more important than ever when everyone is working remotely — no more walking down the hall to ask a question. This is a massive change for most organizations. It’s critical to take steps to verify identities before allowing access to your network or data. As a reminder, MFA consists of three …

Read more

Someone Stole My Company Laptop! Now What?

When your company laptop goes missing, it’s time to leap into action! Whether it was stolen from your car, disappeared in the airport security line, or was physically wrenched from your hands in a grab-and-run, these seven steps apply: 1. Call your IT department or your company IT service provider. They need to know as …

Read more

How Can We Help?
close slider
Send this to a friend