Drag

Tag: #cybersecurity

Why Hackers Target Small Businesses 3x More

Have you felt more secure from cyberattacks because you have a smaller business? Maybe you thought that you couldn’t possibly have anything that a hacker could want? Didn’t think they even knew about your small business. Well, a new report...
Read more

Beware Reply-Chain Phishing Attacks: 5 Tips

Phishing. It seems you can’t read an article on cybersecurity without it coming up. That’s because phishing is still the number one delivery vehicle for cyberattacks. A cybercriminal may want to steal employee login credentials. Or wish to launch a...
Read more

6 Key IT Policies Every Company Must Have

Many small businesses make the mistake of skipping policies. They feel that things don’t need to be so formal. They’ll just tell staff what’s expected when it comes up and think that’s good enough. But this way of thinking can...
Read more
IoT

Why Put IoT Devices on Guest Wi-Fi for Security

The number of internet-connected devices in homes has been growing. It’s increased exponentially over the last decade. A typical home now has 10.37 devices connected to the internet. PCs and mobile devices make up a little over half of those...
Read more

SLAM Method: 5 Ways to Boost Phishing Detection

There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade or two, it has been the main delivery method for all types of attacks. Ransomware, credential theft, database...
Read more

Most Secure vs Convenient MFA Methods in 2022

Credential theft is now at an all-time high and is responsible for more data breaches than any other type of attack. With data and business processes now largely cloud-based, a user’s password is the quickest and easiest way to conduct...
Read more

7 Signs Your Computer Has Malware in 2022

Approximately 34% of businesses take a week or longer to regain access to their data and systems once hit with a malware attack. Malware is an umbrella term that encompasses many different types of malicious code. It can include: Viruses...
Read more

6 Ways to Stop Social Phishing Attacks

Phishing is the number one method of attack delivery for everything from ransomware to credential theft. We are very aware of it coming by email, but other types of phishing have been growing rapidly. In recent years, phishing over social...
Read more

Want to talk to someone about your business?