Card image cap

January 28, 2020 | Lizzie Danielson

What Is the Difference Between Foundational Security and Advanced Security?

Continue Reading

Card image cap

January 23, 2020 | Ross Fillipek

Basic Cyber Hygiene in Today’s Threat Landscape

Given the sheer number of security products on the market today, you’d think cyberattackers wouldn’t stand a chance. We have numerous amounts of boxes, blinking lights, and apps at our disposal that are supposed to protect us from just about every conceivable cyber malady. And yet nearly every day we hear about some unfortunate organization […]

Continue Reading

Card image cap

January 21, 2020 | Ryan Ferguson

The Hack is from Inside the Network: Mitigating Insider Threats

How To Mitigate Threats from Inside Your Network Think back to the most recent cybersecurity advertisement you’ve seen. Chances are the advertisement sold the abilities of the product or service at keeping intruders out of your network. They may have utilized the images of barbarians being thwarted at a castle moat to drive home just […]

Continue Reading

Card image cap

January 16, 2020 | Ryan Ferguson

Plan the Work, Work the Plan

Why Every Organization Needs an Incident Response Plan Incident response is an area of cybersecurity that many people feel uncomfortable discussing. It’s difficult to fathom that even with considerable investment in qualified staff and robust defenses that your organization could still be the victim of a cyber-attack. This line of thinking can cause C-level executives […]

Continue Reading

Card image cap

January 14, 2020 | Nathan Maederer

What is Defense in Depth?

What 3 Things Does a Cybercriminal Need To Breach Your Network? Time Energy Resources A cybercriminal only needs these three things to breach any network in the world. If someone is determined enough to breach a network, including yours, they can, and they will. All technology can be breached no matter how secure you believe […]

Continue Reading

Card image cap

January 9, 2020 | Lizzie Danielson

5 Tips for Dealing with Employee Departures

Does Your Business Have a Plan in Place for an Employee Departure? I read a sentencing brief recently that included a laundry list of fraudulent actions an employee engaged in that eventually led to their termination and criminal prosecution. While the employee’s actions were astounding, the level of access they still had in the organization following their termination was even more […]

Continue Reading

Card image cap

January 7, 2020 | Lizzie Danielson

The Alert Who Cried Malware

  What Exactly Is Malware? Malware is any software that is designed to cause damage to your computer, server, or computer network. Viruses, ransomware, and spyware are all forms of Malware. Malware has been around and a threat since the early 1970s when the Creeper Virus first appeared. Malware steals personal data and can hold […]

Continue Reading

Card image cap

January 2, 2020 | Lizzie Danielson

DoD Ramping Up Cyber Requirements for Contractors

Is Your Organization Prepared for the New Cyber Requirments for DoD Contractors? If your organization is in a position to bid on DoD contracts, take note: the Cybersecurity Maturity Model Certification (CMMC) is on the horizon. DoD contract bidders are already familiar with requirements such as documenting a System Security Plan (SSP) and Plan of […]

Continue Reading

Card image cap

December 23, 2019 | Lizzie Danielson

NIST & DFARS Compliance – What You Need To Know

What Exactly is NIST? The National Institute of Standards and Technology (NIST) was founded in 1901 and now is part of the U.S Department of Commerce. Congress established the agency to remove a major challenge to U.S industrial competitiveness at the time. In today’s world NIST works with any company acting as a government contractor. […]

Continue Reading

Card image cap

December 6, 2019 | Corsica Technologies

Corsica Technologies hosts Star Wars® Movie Premiere in Bowie, MD

Bowie, MD, December 6th, 2019 – Corsica Technologies will be hosting an exclusive showing of Star Wars: The Rise of Skywalker® for business leaders in the Bowie area on December 20. Prior to the presentation, attendees will learn actionable tips that will help secure their business from cyber attacks. The event will take place on […]

Continue Reading