3 Ways Hackers Use Social Media

Over the past few years, hackers have found ways to use social media for fraud. Does this mean you should stop using social media for personal and business purposes? Absolutely not. The key is to be smart about your online practices. Cybersecurity is important across all parts of your daily life – from banking to personal email and social media.

6 Steps to Prepare for a Cyber Attack

Many companies have an incident response plan that may look great on paper but they have not tested the execution. Key stakeholders must agree on the strategy, evolve it over time and be able to implement it confidently during an incident.

BYOD Security – What It Is and How It Affects Your Business

Despite concerns about Bring Your Own Device (BYOD) security risks, employees over the past years have enjoyed the multiple benefits of BYOD.  Employers are unlikely to ever stop staff from bringing their own devices to work or using them remotely for work purposes.

5 Things to Look For Before You Click – The Anatomy of a Phishing Email

At the most basic level, a phishing scam involves sending fraudulent emails that appear to be from a reputable person or company, with the goal of deceiving recipients into either clicking on a malicious link or downloading an infected attachment, usually to steal financial or confidential information.

What You Need To Know About The New Data Breach Notification Law

The Act requires companies to provide Alabama residents with notification of a breach within 45 days of discovery. Notification is triggered by a determination of a breach that poses a risk of harm to impacted individuals.

Does My Company Need a Security Operations Center Service (SOC)?

You can’t manage what you can’t see. Even a small network generates over 250,000 logs per hours. An impossible task for a human to review. We now live in the days of sophisticated digital hackers so your concern shouldn’t be if you’re going to get hacked, but what you’re going to do when it happens.

3 Ways to Shield Against Internet-of-Things Security Threats

IoT in all its flavors (e.g., physical security systems, lights, appliances, heating and air conditioning systems, as well as artificial intelligence-based automated agents such as chatbots) exposes companies and consumers alike to a wide range of security threats.

4 Things You Didn’t Know About the Dark Web

Sure, you’ve heard of the dark web, but do you know what it is actually used for and how to access it? More importantly, should you even try to access it?

How Phishers Are Using Encrypted Sites to Scam You

Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. 

5 Ransomware Statistics Every Business Owner Needs to Know

While ransomware statistics in 2017 were alarming in terms of growth and severity of attacks, the cybersecurity industry has made great strides in defending against them. But despite our best efforts, the threat shows no signs of going away.