Card image cap

June 26, 2020 | Delano Collins

Beyond Antivirus: How to Protect your Business from the Unknown

With an increasing number of IT executives concerned about the impact and legal ramifications posed by the threats of advanced malware such as fileless malware, 0-day and other emerging threats and a decreasing level of confidence in their ability to combat or even detect these threats, EDR solutions have quickly become essential for businesses looking to manage cybersecurity risk.

Continue Reading

Card image cap

June 18, 2020 | Lizzie Danielson

Ransomware 101- How Much Is Your Data Worth to You?

Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website.

Continue Reading

Card image cap

June 11, 2020 | Lizzie Danielson

Penalties and Consequences of Not Complying with New York SHIELD Act

New York’s SHIELD Act is now in full effect. While this act amending the state’s cybersecurity requirements was signed in July 2019, some of its measures began in October 2019, while the rest went into effect in March 2020.

Continue Reading

Card image cap

June 9, 2020 | Lizzie Danielson

Office 365 is Now Microsoft 365- What Does That Mean for Users?

Microsoft recently changed the name of its flagship product from Office 365 to Microsoft 365. According to the software giant, the name change was a part of natural evolution. Microsoft 365 began in 2017 as an enterprise offering that contained a combination of Windows, Office, and Enterprise Mobility and Security.

Continue Reading

Card image cap

June 2, 2020 | Lizzie Danielson

What Is Digital Transformation?

Digital Transformation is about changing the way a business interacts internally and with its customers and creating a process that ensures a consistent experience in a more efficient way.

Continue Reading

Card image cap

May 21, 2020 | Robert Smith

Business Continuity: More than Back Ups

Business Continuity for many organizations ends with the implementation of one solution - a system backup. There are many types of system backup including file-based or imaged based, onsite, or offsite, daily or hourly. And system backups are a major factor in the success of a business’s recovery, but it is not the only component.

Continue Reading

Card image cap

May 19, 2020 | Lizzie Danielson

A Look at the Corsica Technologies Cyber Security Awareness Training Program

Security Awareness training is a form of education where our team of experts provides information and knowledge on how to not get taken advantage of online by cyber threats.

Continue Reading

Card image cap

May 13, 2020 | Peter

Remote Work is the New Normal. Here’s How to Embrace It.

Although many industries have been forced to quickly pivot to a remote workforce due to COVID-19, the shift is not a new one. Over the last five years remote work has seen a 44% growth, over the last decade that number is 91%.

Continue Reading

Card image cap

May 7, 2020 | Peter

Five Ways to Defend Against COVID-19 Scams

From tricking people into revealing sensitive information on social media to requesting donations for fraudulent charities, cybercriminals have been working hard to leverage the hype and fear surrounding COVID-19.

Continue Reading

Card image cap

May 5, 2020 | David Powell

Improving Business Efficiency Post COVID-19

While we do not have all of the answers, we do have some suggestions on ways to improve efficiencies in your business and gain a competitive edge in light of the recent COVID-19 pandemic. There is no playbook for businesses on how to reopen after a pandemic related shutdown, so everyone will be looking for the best path forward.

Continue Reading