Card image cap

February 11, 2020 | Lizzie Danielson

9 Common Signs of a Phishing Attack

Phishing tops the list of data privacy and security risks concerns for most organizations according to a survey completed by Deloitte leaders. And, these concerns are valid. Email users continue to be overconfident about their ability to spot phishing messages.

Continue Reading

Card image cap

February 4, 2020 | Nathan Maederer

What Is Cyber Insurance?

Upon a quick Google Search, you will find Cyber Insurance is defined as protecting businesses and individuals from network-based risks and attacks. You would also find out that large insurance

Continue Reading

Card image cap

January 28, 2020 | Lizzie Danielson

What Is the Difference Between Foundational Security and Advanced Security?

With recent cyber attacks aimed at small to mid-size businesses and concerns about the potential for malicious Iranian cyber activity, organizations are taking a closer look at how they handle cybersecurity.

Continue Reading

Card image cap

January 23, 2020 | Ross Fillipek

Basic Cyber Hygiene in Today’s Threat Landscape

Given the sheer number of security products on the market today, you’d think cyberattackers wouldn’t stand a chance. We have numerous amounts of boxes, blinking lights, and apps at our disposal that are supposed to protect us from just about every conceivable cyber malady. And yet nearly every day we hear about some unfortunate organization […]

Continue Reading

Card image cap

January 21, 2020 | Ryan Ferguson

The Hack is from Inside the Network: Mitigating Insider Threats

How To Mitigate Threats from Inside Your Network Think back to the most recent cybersecurity advertisement you’ve seen. Chances are the advertisement sold the abilities of the product or service at keeping intruders out of your network. They may have utilized the images of barbarians being thwarted at a castle moat to drive home just […]

Continue Reading

Card image cap

January 16, 2020 | Ryan Ferguson

Plan the Work, Work the Plan

Why Every Organization Needs an Incident Response Plan Incident response is an area of cybersecurity that many people feel uncomfortable discussing. It’s difficult to fathom that even with considerable investment in qualified staff and robust defenses that your organization could still be the victim of a cyber-attack. This line of thinking can cause C-level executives […]

Continue Reading

Card image cap

January 14, 2020 | Nathan Maederer

What is Defense in Depth?

What 3 Things Does a Cybercriminal Need To Breach Your Network? Time Energy Resources A cybercriminal only needs these three things to breach any network in the world. If someone is determined enough to breach a network, including yours, they can, and they will. All technology can be breached no matter how secure you believe […]

Continue Reading

Card image cap

January 9, 2020 | Lizzie Danielson

5 Tips for Dealing with Employee Departures

Does Your Business Have a Plan in Place for an Employee Departure? I read a sentencing brief recently that included a laundry list of fraudulent actions an employee engaged in that eventually led to their termination and criminal prosecution. While the employee’s actions were astounding, the level of access they still had in the organization following their termination was even more […]

Continue Reading

Card image cap

January 7, 2020 | Lizzie Danielson

The Alert Who Cried Malware

  What Exactly Is Malware? Malware is any software that is designed to cause damage to your computer, server, or computer network. Viruses, ransomware, and spyware are all forms of Malware. Malware has been around and a threat since the early 1970s when the Creeper Virus first appeared. Malware steals personal data and can hold […]

Continue Reading

Card image cap

January 2, 2020 | Lizzie Danielson

DoD Ramping Up Cyber Requirements for Contractors

Is Your Organization Prepared for the New Cyber Requirments for DoD Contractors? If your organization is in a position to bid on DoD contracts, take note: the Cybersecurity Maturity Model Certification (CMMC) is on the horizon. DoD contract bidders are already familiar with requirements such as documenting a System Security Plan (SSP) and Plan of […]

Continue Reading