A strong, mandatory password policy is one of the best ways to protect your network.
Since the U.S. is facing both an active hurricane and fire season this year, it feels timely to discuss what we can do to prepare electronically for a physical disaster.… Read more Preparing Electronically for a Disaster →
Today we are going to circle back to the Twitter hack that occurred earlier this summer. We have some new information about how the hack was executed and a warning… Read more Sophisticated Social Engineering →
Some organizations require that any software installed on a network device or any hardware connected to the network be approved through their IT department. When users install software, apps, or… Read more Shadow IT →
Cybersecurity incidents can cause major harm to an organization’s operations and reputation. An accidental click by an employee can lead to ransomware or a data breach, which costs the company… Read more Handling Cybersecurity Incidents →
We talk a lot about ransomware on the blog. It’s one of the biggest threats to an organization’s productivity, data, and reputation. Today, we are going to talk about NetWalker,… Read more Ransomware As a Service →
The pandemic has sent many of us from our office to our homes to get the job done. Everyone has had to adapt quickly to a new normal and there… Read more Remote Work Challenges →
Last week, Twitter made national news when unusual tweets were posted from high profile accounts. Had it been hacked? Accounts from Joe Biden, Elon Musk, Bill Gates, Apple and others… Read more The Twitter Hack and Insider Threats →