Card image cap

May 19, 2020 | Lizzie Danielson

A Look at the Corsica Technologies Cyber Security Awareness Training Program

Security Awareness training is a form of education where our team of experts provides information and knowledge on how to not get taken advantage of online by cyber threats.

Continue Reading

Card image cap

May 7, 2020 | Peter

Five Ways to Defend Against COVID-19 Scams

From tricking people into revealing sensitive information on social media to requesting donations for fraudulent charities, cybercriminals have been working hard to leverage the hype and fear surrounding COVID-19.

Continue Reading

Card image cap

April 27, 2020 | Peter

How Social Media Trends are Exposing Your Personal Information

Latest Social Media trends include sharing your senior photo alongside details such as the name of your high school, the year you graduated, and your mascot. Hackers are using these personal details to gain access to your confidential accounts and personal data. Skip the trend and protect your personal data.

Continue Reading

Card image cap

April 17, 2020 | Delano Collins

Why Endpoint Detection & Response is so important for your Remote Workforce

Endpoint Detection & Response (EDR) is a critical tool in combatting cybersecurity threats. The best EDR solutions are used to detect anomalous activity on endpoints (servers, workstations, laptops, and some mobile devices). While some mistakenly assume antivirus does these same things, antivirus only looks for known bad programs that match a specific signature

Continue Reading

Card image cap

April 15, 2020 | Ross Fillipek

Remote Workforce- Cybersecurity & Policy & Software Deployment

As the COVID-19 pandemic continues to necessitate that many employees work from home, businesses are struggling to ensure that this newfound flexibility doesn’t negatively impact their cybersecurity efforts

Continue Reading

Card image cap

April 9, 2020 | Johnny Walton

Zoombombing: How to Secure Your Remote Workforce

Zoombombing, Zoom-bombing or Zoom raiding is the unwanted intrusion into a video conference call by an individual, which causes disruption.

Continue Reading

Card image cap

April 3, 2020 | Ryan Ferguson

Remote Workforce: How to Connect Your Team Securely Without Interruptions

While working remote isn’t new to the tech world it is new for many other industries that are adapting to this new environment due to COVID-19 and with this increase in the remote workforce, cyber attackers are taking advantage. This means that ransomware and malware are at an all-time high.

Continue Reading

Card image cap

February 25, 2020 | Lizzie Danielson

Cyber Resilience: What’s Your Strategy?

The rise of ransomware continues with, most recently, the falling victim to receiving an infected email. Rockdale received a spam email containing ransomware discovered after an employee opened an attachment.

Continue Reading

Card image cap

February 11, 2020 | Lizzie Danielson

9 Common Signs of a Phishing Attack

Phishing tops the list of data privacy and security risks concerns for most organizations according to a survey completed by Deloitte leaders. And, these concerns are valid. Email users continue to be overconfident about their ability to spot phishing messages.

Continue Reading

Card image cap

February 4, 2020 | Nathan Maederer

What Is Cyber Insurance?

Upon a quick Google Search, you will find Cyber Insurance is defined as protecting businesses and individuals from network-based risks and attacks. You would also find out that large insurance

Continue Reading