The 6 Layers of Email Defense

Img featured 6 layers email defense 1

For today’s Tuesday Tech Tip, I want to talk about the six layers of email defense that every business needs to have in place.

PSA: Concerning Uptick in Email Threats

Img featured psa concerning uptick 1

As events in the world continue to unfold, we once again urge everyone to be very careful and vigilant about unusual activity on their devices as well as your emails.

Data Breach Investigations Report Findings

Img featured data breach investigation 1

The Data Breach Investigations Report findings for 2021 is the topic for today’s tech tip. The Data Breach Investigations Report (DBIR) is a report that analyzes all of the data breaches for the prior year.

What Is A Baseline Security Assessment?

I want to talk to you this morning about a baseline network analysis, or possibly what could be called a security risk assessment. And why you need one. Philip Long here, CEO of Business Information Solutions in Cyber Fortress. First off, let’s talk about what is a baseline security risk assessment? Well, ultimately, it is […]

How Can Microsoft Teams Help Your Business?

https://youtu.be/EzBfM_IHG0Q For Today’s Tech Tip Tuesday. I want to talk about Microsoft Teams and how it can help your business.  We’re taking a look at the Microsoft Team’s dashboard right now. In this application, there are really so many things that are so very powerful. We know that we can do just a simple chat. […]

6 Cybersecurity Tips for Municipalities

Municipalities are a cybercriminal’s dream. They’re packed full of confidential information on residents and employees, offering a digital buffet of social security numbers, banking information, addresses, and more. Plus, a well-placed piece of malware in a municipal system can cause ultimate chaos – think failing traffic lights, downed payment systems, and a total disruption of […]

6 Steps to Prepare for a Cyber Attack

Many companies have an incident response plan that may look great on paper but they have not tested the execution. Key stakeholders must agree on the strategy, evolve it over time and be able to implement it confidently during an incident.

4 Cyber Security Predictions for 2018

If 2017 has shown us anything, it’s that even major organizations can come to a grinding halt due to cyber security attacks. This message probably won’t come as a surprise to many businesses.  After all, several big-name brands have suffered embarrassing data breaches in recent years, causing significant financial and reputational damage. What makes this […]

Best Cyber Security 2017

Best Cyber Security 2017 Cyber Security is as Important as Safety and Health in the Workplace Cyber security in the workplace is more important today than it has ever been. Hackers are giving business owners a run for their money with the latest tricks. Business owners are realizing that having the right cyber security system […]