Card image cap

May 21, 2020 | Robert Smith

Business Continuity: More than Back Ups

Business Continuity for many organizations ends with the implementation of one solution - a system backup. There are many types of system backup including file-based or imaged based, onsite, or offsite, daily or hourly. And system backups are a major factor in the success of a business’s recovery, but it is not the only component.

Continue Reading

Card image cap

May 19, 2020 | Lizzie Danielson

A Look at the Corsica Technologies Cyber Security Awareness Training Program

Security Awareness training is a form of education where our team of experts provides information and knowledge on how to not get taken advantage of online by cyber threats.

Continue Reading

Card image cap

May 13, 2020 | Peter

Remote Work is the New Normal. Here’s How to Embrace It.

Although many industries have been forced to quickly pivot to a remote workforce due to COVID-19, the shift is not a new one. Over the last five years remote work has seen a 44% growth, over the last decade that number is 91%.

Continue Reading

Card image cap

May 7, 2020 | Peter

Five Ways to Defend Against COVID-19 Scams

From tricking people into revealing sensitive information on social media to requesting donations for fraudulent charities, cybercriminals have been working hard to leverage the hype and fear surrounding COVID-19.

Continue Reading

Card image cap

May 5, 2020 | David Powell

Improving Business Efficiency Post COVID-19

While we do not have all of the answers, we do have some suggestions on ways to improve efficiencies in your business and gain a competitive edge in light of the recent COVID-19 pandemic. There is no playbook for businesses on how to reopen after a pandemic related shutdown, so everyone will be looking for the best path forward.

Continue Reading

Card image cap

April 27, 2020 | Peter

How Social Media Trends are Exposing Your Personal Information

Latest Social Media trends include sharing your senior photo alongside details such as the name of your high school, the year you graduated, and your mascot. Hackers are using these personal details to gain access to your confidential accounts and personal data. Skip the trend and protect your personal data.

Continue Reading

Card image cap

April 20, 2020 | Lizzie Danielson

SHIELD Act Compliance: The Definitive Guide for New York Businesses

SHIELD Act requires companies to implement and maintain reasonable security measures. Affected businesses must deploy safeguards to protect the security, confidentiality, and integrity of private information of New York residents including, but not limited to, secure disposal of data.

Continue Reading

Card image cap

April 17, 2020 | Delano Collins

Why Endpoint Detection & Response is so important for your Remote Workforce

Endpoint Detection & Response (EDR) is a critical tool in combatting cybersecurity threats. The best EDR solutions are used to detect anomalous activity on endpoints (servers, workstations, laptops, and some mobile devices). While some mistakenly assume antivirus does these same things, antivirus only looks for known bad programs that match a specific signature

Continue Reading

Card image cap

April 15, 2020 | Ross Fillipek

Remote Workforce- Cybersecurity & Policy & Software Deployment

As the COVID-19 pandemic continues to necessitate that many employees work from home, businesses are struggling to ensure that this newfound flexibility doesn’t negatively impact their cybersecurity efforts

Continue Reading

Card image cap

April 9, 2020 | Johnny Walton

Zoombombing: How to Secure Your Remote Workforce

Zoombombing, Zoom-bombing or Zoom raiding is the unwanted intrusion into a video conference call by an individual, which causes disruption.

Continue Reading