Card image cap

March 25, 2020 | Delano Collins

Remote Workers During COVID-19, How’s Your Cyber Security?

Businesses around the world are proving their resilience during the current state of pandemic brought on by Coronavirus or COVID-19 by embracing remote work. Traditional commuters are now connecting remotely to their office networks and using video conferencing at an increasing rate.

Continue Reading

Card image cap

March 20, 2020 | Lisa Pham

How Hackers are Using Coronavirus to Compromise Your Computer

Given the rapidly evolving story around the COVID-19 pandemic, countless Americans are actively searching for information. Hackers have taken notice and are wasting no time trying to take advantage in a number of ways.

Continue Reading

Card image cap

March 18, 2020 | Lizzie Danielson

Cyber Threat Protection- Work From Home Recommendations

As more and more organizations encourage their employees to work from home to mitigate the spread of COVID-19, there’s the risk that they could increase the chance of another virus spreading. The kind of virus that we are referring to is malware.

Continue Reading

Card image cap

March 16, 2020 | Lizzie Danielson

Corona Virus Pandemic – Is Your Business Continuity Plan Ready?

Now that the Corona virus (also known as COVID-19) has been declared a pandemic, more and more organizations are looking for ways to keep their workforce safe and continue operations running for their clients.

Continue Reading

Card image cap

March 4, 2020 | Lizzie Danielson

What is Patch Management and Why Does It Matter?

Let’s start by explaining what a patch is. A patch is a piece of code that can be applied to a software program after it has been installed. Patches are created in order to correct issues with that program that are discovered after it has been released. You can think of it like a bandage or a fix for the program or system.

Continue Reading

Card image cap

February 25, 2020 | Lizzie Danielson

Cyber Resilience: What’s Your Strategy?

The rise of ransomware continues with, most recently, the falling victim to receiving an infected email. Rockdale received a spam email containing ransomware discovered after an employee opened an attachment.

Continue Reading

Card image cap

February 11, 2020 | Lizzie Danielson

9 Common Signs of a Phishing Attack

Phishing tops the list of data privacy and security risks concerns for most organizations according to a survey completed by Deloitte leaders. And, these concerns are valid. Email users continue to be overconfident about their ability to spot phishing messages.

Continue Reading

Card image cap

February 4, 2020 | Nathan Maederer

What Is Cyber Insurance?

Upon a quick Google Search, you will find Cyber Insurance is defined as protecting businesses and individuals from network-based risks and attacks. You would also find out that large insurance

Continue Reading

Card image cap

January 28, 2020 | Lizzie Danielson

What Is the Difference Between Foundational Security and Advanced Security?

With recent cyber attacks aimed at small to mid-size businesses and concerns about the potential for malicious Iranian cyber activity, organizations are taking a closer look at how they handle cybersecurity.

Continue Reading

Card image cap

January 23, 2020 | Ross Fillipek

Basic Cyber Hygiene in Today’s Threat Landscape

Given the sheer number of security products on the market today, you’d think cyberattackers wouldn’t stand a chance. We have numerous amounts of boxes, blinking lights, and apps at our disposal that are supposed to protect us from just about every conceivable cyber malady. And yet nearly every day we hear about some unfortunate organization […]

Continue Reading