Beware of sneaky Microsoft Office malware…

Beware of sneaky Microsoft Office malware…

Cybersecurity systems are getting better at identifying and preventing attacks coming from all directions. At the same time, hackers are coming up with new ways to bypass these systems. While online scams are the most common ways to do this, cyber-criminals have discovered a new attack method using Microsoft Office.

IoT Security Awareness: IoT Devices and Security Recommendations For Your Office

IoT Security Awareness: IoT Devices and Security Recommendations For Your Office

Manufacturers and consumers alike continue to embrace the efficiency and personalized service of the multitude of network connected devices known collectively as the Internet of Things or IoT. Connected devices are now performing processes which were immune from malicious cyber activity because they were accomplished manually.

What is NIST Compliance? The NIST Cybersecurity Framework Explained

What is NIST Compliance? The NIST Cybersecurity Framework Explained

New cybersecurity requirements for government agencies and contractors, special publications for agencies, contractors/ sub-contractors, and everyone else in between. It's a lot of information. Here we take a moment to explain it all.

If you know what the NIST Cybersecurity Framework is, or have at least heard the terms popping up, chances are it affects your organization.

VoIP Phishing: This is How Scammers do it

VoIP Phishing: This is How Scammers do it

Although many companies still use traditional phones, an increasing number rely on VoIP’s (Voice over Internet Protocol) multi-functionality, which allows employees to make voice calls, conduct video-conferences, and chat. Although many scammers send fraudulent emails to extort money or steal data from businesses, new ‘vishing’ campaigns are proving to be a more efficient way to scam.

What is Cyber Liability Insurance?

What is Cyber Liability Insurance?

Cyber Liability addresses the first and third party risks associated with e-commerce businesses, the Internet, networks and informational assets. Cyber Liability Insurance offers coverage protection for exposures arising out of Internet communications.

The History of Hacking: Are all hackers out to do harm?

The History of Hacking: Are all hackers out to do harm?

The days of  home-organized hacking led by thrill-seeking teenagers are gone. Learn how hackers are changing the world.
Newspaper headlines and Hollywood movies have influenced our understanding of computer hackers, but in the real world it’s not so simple.

The Top 6 Reasons Small Businesses Outsource Cybersecurity

The Top 6 Reasons Small Businesses Outsource Cybersecurity

Outsource cybersecurity: Small businesses are working smarter by managing their network security through a service provider.

A chaotic 2017 has seen several cybersecurity meltdowns, so far. If you'd like to get caught up, read "The Biggest Cybersecurity Disasters of 2017 So Far" There is an epidemic taking place in the world of technology today.

Checklist – Know These Types of Malware to Stay Protected

Checklist – Know These Types of Malware to Stay Protected

Computer threats have been around for decades. In fact, one of the first computer viruses was detected in the early 70s. Technology has come a long way since then, but so have online threats: Spyware, ransomware, virus, trojans, and all types of malware designed to wreak havoc.

IT Security Risks that SMEs Cannot Afford to Ignore

IT Security Risks that SMEs Cannot Afford to Ignore

When it comes to IT security threats, no business is immune to them. However, large enterprises have the luxury of information and resources to reduce the chances of being hit by ransomware, hackers, and other cyber crimes compared to small and mid-sized businesses.