What is NIST Compliance? The NIST Cybersecurity Framework Explained

What is NIST Compliance? The NIST Cybersecurity Framework Explained

New cybersecurity requirements for government agencies and contractors, special publications for agencies, contractors/ sub-contractors, and everyone else in between. It's a lot of information. Here we take a moment to explain it all.

If you know what the NIST Cybersecurity Framework is, or have at least heard the terms popping up, chances are it affects your organization.

SMBs survive disasters with virtualization

SMBs survive disasters with virtualization

Hurricanes Harvey and Irma caused millions of dollars in damages. Some of that damage was unavoidable, but hundreds of businesses managed to stay open thanks to innovative virtualization solutions. If you’re not already taking advantage of this technology, it’s time to find out what you’re missing.

Reduce your printing costs with these 5 tips

Reduce your printing costs with these 5 tips

Outdated printers, the lack of a printing workflow, and an over-reliance on hard copies may be contributing to your ballooning printing expenditures. With some creative problem-solving and fresh ideas, you could drastically reduce your printing budget.

VoIP Phishing: This is How Scammers do it

VoIP Phishing: This is How Scammers do it

Although many companies still use traditional phones, an increasing number rely on VoIP’s (Voice over Internet Protocol) multi-functionality, which allows employees to make voice calls, conduct video-conferences, and chat. Although many scammers send fraudulent emails to extort money or steal data from businesses, new ‘vishing’ campaigns are proving to be a more efficient way to scam.

Common Misconceptions About Cyber Liability

Common Misconceptions About Cyber Liability

We've partnered with The Armstrong Company to feature a blog series on cyber liability and how it can affect you. Keep reading for some of the most common misconceptions about cyber liability, according to the experts!

Cyber liability coverage (for data breaches) has evolved from just insurance for information technology companies to coverage that nearly every kind of business should have - if they don't already.

The History of Hacking: Are all hackers out to do harm?

The History of Hacking: Are all hackers out to do harm?

The days of  home-organized hacking led by thrill-seeking teenagers are gone. Learn how hackers are changing the world.
Newspaper headlines and Hollywood movies have influenced our understanding of computer hackers, but in the real world it’s not so simple.

The Top 6 Reasons Small Businesses Outsource Cybersecurity

The Top 6 Reasons Small Businesses Outsource Cybersecurity

Outsource cybersecurity: Small businesses are working smarter by managing their network security through a service provider. A chaotic 2017 has seen several cybersecurity meltdowns, so far. If you'd like to get caught up, read "The Biggest Cybersecurity Disasters of 2017 So Far" There is an epidemic taking place in the world of technology today.

Checklist – Know These Types of Malware to Stay Protected

Checklist – Know These Types of Malware to Stay Protected

Computer threats have been around for decades. In fact, one of the first computer viruses was detected in the early 70s. Technology has come a long way since then, but so have online threats: Spyware, ransomware, virus, trojans, and all types of malware designed to wreak havoc.