Prioritize Phishing Protection in your 2019 Security Strategy: Part 5 – Multi-Factor Authentication

Passwords. Ten years ago passwords were a great way to protect people and information, but technology isn’t the same as it was ten years ago. Although passwords and other encryption methods continue to become more complex, so do the skills and technology of cyber-criminals. Veridium said it best in an article about passwords and multi-factor … More Prioritize Phishing Protection in your 2019 Security Strategy: Part 5 – Multi-Factor Authentication

Prioritize Phishing Protection in your 2019 Security Strategy: Part 4 – Security Awareness Training

While each of the topics we’ve covered so far in our Phishing Protection Series is important, security awareness training for your end users might just be the most important topic so far. After all, you are only as strong as your weakest link. The Infosec Institute has a great list of the top ten benefits … More Prioritize Phishing Protection in your 2019 Security Strategy: Part 4 – Security Awareness Training

Prioritize Phishing Protection In Your 2019 Security Strategy: Part 2 – Email Content Security

In this day and age, email has become completely ingrained into our society. In 2017 alone, 269 billion emails were sent EACH DAY. And that number is estimated to rise to over 333 billion daily emails by 2022. With that much communication flowing back and forth over the internet, it is no question as to … More Prioritize Phishing Protection In Your 2019 Security Strategy: Part 2 – Email Content Security

Something’s Phishy: How to Spot a Phishing Email

  Just because you have security software on your computer or phone doesn’t mean you’re safe from phishing emails. In fact, that’s what makes phishing so devious. These emails arrive looking so convincing and seemingly harmless that users don’t pause to question it before they click a link or open an attachment – and by … More Something’s Phishy: How to Spot a Phishing Email

Enterprise Email Best Practices to Avoid Malware Distribution

No matter how big or how small, malware is something that no company wants to deal with. One of the most common ways that cyber-criminals are distributing malware is through email. Whether it is a link or an attachment, all it takes is one-click to take your company down. We are sharing our top email security … More Enterprise Email Best Practices to Avoid Malware Distribution

Behind the Brain Power | Preparing Your Technology for 2017

The new year is right around the corner, and it is important that you take the right steps to prepare your company and your technology for 2017. Our guys are sharing their thoughts and tips on how to handle your technology as we transition to the new year. What should you look at replacing? What should … More Behind the Brain Power | Preparing Your Technology for 2017

Cyber Security Tips for the Holidays

“It’s the most wonderful time of the year!” It’s the time of year with beautiful lights, festive foods, holiday cheer, and well-wishes from family and friends. It can definitely classify as one of the best times of the year … except in the cyber-security world. This is the time of year when financially-motivated cyber criminals are most … More Cyber Security Tips for the Holidays

Behind the Brain Power | 4 Tips to Protect Your Data when Traveling

It’s officially the holiday season, and that means that everyone is traveling! Did you know that traveling is one of the likeliest times that you can lose valuable information or data? It’s because you tend to be rushed, things can get stolen, and you can misplace important items. Our Senior Team has listed the top … More Behind the Brain Power | 4 Tips to Protect Your Data when Traveling