Card image cap

March 20, 2020 | Lizzie Danielson

How Hackers are Using Coronavirus to Compromise Your Computer

Given the rapidly evolving story around the COVID-19 pandemic, countless Americans are actively searching for information. Hackers have taken notice and are wasting no time trying to take advantage in a number of ways.

Continue Reading

Card image cap

March 18, 2020 | Lizzie Danielson

Cyber Threat Protection- Work From Home Recommendations

As more and more organizations encourage their employees to work from home to mitigate the spread of COVID-19, there’s the risk that they could increase the chance of another virus spreading. The kind of virus that we are referring to is malware.

Continue Reading

Card image cap

March 16, 2020 | Lizzie Danielson

Corona Virus Pandemic – Is Your Business Continuity Plan Ready?

Now that the Corona virus (also known as COVID-19) has been declared a pandemic, more and more organizations are looking for ways to keep their workforce safe and continue operations running for their clients.

Continue Reading

Card image cap

March 4, 2020 | Lizzie Danielson

What is Patch Management and Why Does It Matter?

Let’s start by explaining what a patch is. A patch is a piece of code that can be applied to a software program after it has been installed. Patches are created in order to correct issues with that program that are discovered after it has been released. You can think of it like a bandage or a fix for the program or system.

Continue Reading

Card image cap

February 25, 2020 | Lizzie Danielson

Cyber Resilience: What’s Your Strategy?

The rise of ransomware continues with, most recently, the falling victim to receiving an infected email. Rockdale received a spam email containing ransomware discovered after an employee opened an attachment.

Continue Reading

Card image cap

February 11, 2020 | Lizzie Danielson

9 Common Signs of a Phishing Attack

Phishing tops the list of data privacy and security risks concerns for most organizations according to a survey completed by Deloitte leaders. And, these concerns are valid. Email users continue to be overconfident about their ability to spot phishing messages.

Continue Reading

Card image cap

January 28, 2020 | Lizzie Danielson

What Is the Difference Between Foundational Security and Advanced Security?

With recent cyber attacks aimed at small to mid-size businesses and concerns about the potential for malicious Iranian cyber activity, organizations are taking a closer look at how they handle cybersecurity.

Continue Reading

Card image cap

January 9, 2020 | Lizzie Danielson

5 Tips for Dealing with Employee Departures

Does Your Business Have a Plan in Place for an Employee Departure? I read a sentencing brief recently that included a laundry list of fraudulent actions an employee engaged in that eventually led to their termination and criminal prosecution. While the employee’s actions were astounding, the level of access they still had in the organization following their termination was even more […]

Continue Reading

Card image cap

January 7, 2020 | Lizzie Danielson

The Alert Who Cried Malware

  What Exactly Is Malware? Malware is any software that is designed to cause damage to your computer, server, or computer network. Viruses, ransomware, and spyware are all forms of Malware. Malware has been around and a threat since the early 1970s when the Creeper Virus first appeared. Malware steals personal data and can hold […]

Continue Reading

Card image cap

January 2, 2020 | Lizzie Danielson

DoD Ramping Up Cyber Requirements for Contractors

Is Your Organization Prepared for the New Cyber Requirments for DoD Contractors? If your organization is in a position to bid on DoD contracts, take note: the Cybersecurity Maturity Model Certification (CMMC) is on the horizon. DoD contract bidders are already familiar with requirements such as documenting a System Security Plan (SSP) and Plan of […]

Continue Reading