What Is IT Support?

Discover the crucial role IT support plays in modern businesses, from maintaining systems to protecting networks and data from cyber threats. Learn about the responsibilities of IT technicians and why IT support is essential in 2023.

Which of these phishing scams have you heard of?

You’ve heard of phishing, we’re sure. It’s where criminals send you an email, pretending to be someone else (like your bank), to try to get sensitive information from you. But what about vishing? And smishing? And whaling? These are all forms of phishing designed to steal your information, and ultimately your money. We explore each …

Which of these phishing scams have you heard of? Read More »

This is the ultimate secret to keeping your business data safe

Hackers are targeting all businesses, all the time. Using clever automated tools, and by sending out billions of emails every day. It only takes one person to click on one bad link… and hackers can get into your system. That’s why we’ve written a brand new guide. To tell you about the ultimate secret to …

This is the ultimate secret to keeping your business data safe Read More »

What is gained from Cybersecurity and Physical Security Convergence?

It amazes me that I still sometimes hear people talking about cybersecurity (logical security) and physical security as if they’re separate issues to address and manage. Today, in our connected world, that’s not the case at all. Our digital world has produced a convergence of physical and logical security that brings value to how you …

What is gained from Cybersecurity and Physical Security Convergence? Read More »

Three Practices for Defending Against the Threat from Inside

Cybersecurity Insiders and Crowd Research Partners recently released their “Insider Threat 2018 Report.” The report surveyed 472 cybersecurity professionals about their view and position on the threat posed by “insiders” – the employees and partners that have access to an organization’s business operating systems and data. The report reminds us that protecting against the insider …

Three Practices for Defending Against the Threat from Inside Read More »

Three Ways to Improve the Security and Reduce the Cost of Password Resets

Using passwords as a primary means of authentication for account logins is not going away soon. Despite the work being done to bring in other authentication mechanisms, passwords are here to stay – at least for the near future. We don’t use passwords because they’re the most secure option today; we use them because they’re …

Three Ways to Improve the Security and Reduce the Cost of Password Resets Read More »

Is your cyber security checklist complete?

Suppose you’re using October – National Cyber Security Awareness Month – to take a hard look at your security practices, policies, procedures, and systems. In that case, we’d like to offer a starting point for a security checklist, examining key considerations from a people, process, and technology viewpoint. People: Disgruntled or uninformed employees are one …

Is your cyber security checklist complete? Read More »

Hosting in a secure environment is necessary for all businesses

In today’s online-driven world, it’s not a matter of if, but when a business will a victim of a cyber-attack. The threat of a data breach has become so imminent that an entirely branch of insurance products (cyber liability and privacy policies) have exist specifically to cover a business’ liability in the event a hacker …

Hosting in a secure environment is necessary for all businesses Read More »

Scroll to Top