Card image cap

September 23, 2020 | Lizzie Danielson

How Security Awareness Training Can Help your Business Comply With the SHIELD Act.

Cybersecurity is a necessity for any business today. Organizations that handle private data such as financial or medical information have long been required to safeguard it. But now New York’s SHIELD Act is tightening the regulations for that security.

Continue Reading

Card image cap

September 9, 2020 | Lizzie Danielson

Take a Tour of Our Augusta Based Security Operation Center

At Corsica Technology we have two geographically located Security Operation Centers. Charles Johnson our President of Cyber Security gives a tour of our Augusta based SOC.

Continue Reading

Card image cap

August 14, 2020 | Dale Walls

New Chapter for Corsica Technologies Founder

Continue Reading

Card image cap

August 6, 2020 | Ross Fillipek

Protecting Your Customers’ Sensitive Information

Companies operating in the digital landscape have suffered major attacks since the internet’s inception. In 2018 alone, malicious hackers breached billions of records belonging to social media and government organizations, and millions more across the retail, technology, and other industries accessing customers' sensitive information. 

Continue Reading

Card image cap

July 30, 2020 | Ross Fillipek

MFA: The Super-Tool that can Stop 99% of Password Attacks

Multi-Factor Authentication is a security measure that requires multiple types of credentials to verify a user’s identity to access an account. So when a user logs into an account with a username and password, one or more other factors will also be required before allowing access.

Continue Reading

Card image cap

July 23, 2020 | Lizzie Danielson

How Microsoft Teams Can Improve Your Team’s Collaboration and Productivity

Microsoft Teams is a unified communication and collaboration platform that combines a variety of tools, all working together to promote efficient teamwork and communication.

Continue Reading

Card image cap

July 21, 2020 | Robert Smith

How Network Penetration Testing Can Boost Your Cybersecurity

 Penetration testing is carried out to gauge the risk profile of  of your organization and to determine how likely your core system could be compromised if a threat actor were on your network.

Continue Reading

Card image cap

June 26, 2020 | Delano Collins

Beyond Antivirus: How to Protect your Business from the Unknown

With an increasing number of IT executives concerned about the impact and legal ramifications posed by the threats of advanced malware such as fileless malware, 0-day and other emerging threats and a decreasing level of confidence in their ability to combat or even detect these threats, EDR solutions have quickly become essential for businesses looking to manage cybersecurity risk.

Continue Reading

Card image cap

June 18, 2020 | Lizzie Danielson

Ransomware 101- How Much Is Your Data Worth to You?

Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website.

Continue Reading

Card image cap

June 11, 2020 | Lizzie Danielson

Penalties and Consequences of Not Complying with New York SHIELD Act

New York’s SHIELD Act is now in full effect. While this act amending the state’s cybersecurity requirements was signed in July 2019, some of its measures began in October 2019, while the rest went into effect in March 2020.

Continue Reading