Card image cap

August 6, 2020 | Ross Fillipek

Protecting Your Customers’ Sensitive Information

Companies operating in the digital landscape have suffered major attacks since the internet’s inception. In 2018 alone, malicious hackers breached billions of records belonging to social media and government organizations, and millions more across the retail, technology, and other industries accessing customers' sensitive information. 

Continue Reading

Card image cap

July 30, 2020 | Ross Fillipek

MFA: The Super-Tool that can Stop 99% of Password Attacks

Multi-Factor Authentication is a security measure that requires multiple types of credentials to verify a user’s identity to access an account. So when a user logs into an account with a username and password, one or more other factors will also be required before allowing access.

Continue Reading

Card image cap

July 21, 2020 | Robert Smith

How Network Penetration Testing Can Boost Your Cybersecurity

 Penetration testing is carried out to gauge the risk profile of  of your organization and to determine how likely your core system could be compromised if a threat actor were on your network.

Continue Reading

Card image cap

June 26, 2020 | Delano Collins

Beyond Antivirus: How to Protect your Business from the Unknown

With an increasing number of IT executives concerned about the impact and legal ramifications posed by the threats of advanced malware such as fileless malware, 0-day and other emerging threats and a decreasing level of confidence in their ability to combat or even detect these threats, EDR solutions have quickly become essential for businesses looking to manage cybersecurity risk.

Continue Reading

Card image cap

June 18, 2020 | Lizzie Danielson

Ransomware 101- How Much Is Your Data Worth to You?

Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website.

Continue Reading

Card image cap

June 11, 2020 | Lizzie Danielson

Penalties and Consequences of Not Complying with New York SHIELD Act

New York’s SHIELD Act is now in full effect. While this act amending the state’s cybersecurity requirements was signed in July 2019, some of its measures began in October 2019, while the rest went into effect in March 2020.

Continue Reading

Card image cap

May 19, 2020 | Lizzie Danielson

A Look at the Corsica Technologies Cyber Security Awareness Training Program

Security Awareness training is a form of education where our team of experts provides information and knowledge on how to not get taken advantage of online by cyber threats.

Continue Reading

Card image cap

May 7, 2020 | Peter

Five Ways to Defend Against COVID-19 Scams

From tricking people into revealing sensitive information on social media to requesting donations for fraudulent charities, cybercriminals have been working hard to leverage the hype and fear surrounding COVID-19.

Continue Reading

Card image cap

April 27, 2020 | Peter

How Social Media Trends are Exposing Your Personal Information

Latest Social Media trends include sharing your senior photo alongside details such as the name of your high school, the year you graduated, and your mascot. Hackers are using these personal details to gain access to your confidential accounts and personal data. Skip the trend and protect your personal data.

Continue Reading

Card image cap

April 17, 2020 | Delano Collins

Why Endpoint Detection & Response is so important for your Remote Workforce

Endpoint Detection & Response (EDR) is a critical tool in combatting cybersecurity threats. The best EDR solutions are used to detect anomalous activity on endpoints (servers, workstations, laptops, and some mobile devices). While some mistakenly assume antivirus does these same things, antivirus only looks for known bad programs that match a specific signature

Continue Reading