Seven Tips to Optimize Security

Seven Tips to Optimize Security

As Data breaches continue, phishing attacks are on the rise, and the threat landscape is continuously changing. In the aftermath of a breach, we find that it’s not the lack of tools or information that contributed to the event, but rather the available resources were not deployed appropriately. We are breaking down seven tips to… Read more »

The Workplace Evolution: Adapting to the Digital Office

The Workplace Evolution: Adapting to the Digital Office

The workplace, as we know, is evolving with changing demographics and growing expectations of technology. This is transforming the workplace into a sophisticated modern environment. It has presented businesses with the challenge of both maintaining current systems and allowing for IT innovations. To stay competitive and support the needs of the business, adapting in the… Read more »

90% of Breaches are Due to Social Engineering and Phishing Attacks

90% of Breaches are Due to Social Engineering and Phishing Attacks

When a hacker or malware penetrates your company’s defenses, the first question should always be how did it happen? Most of the time, it was due to social engineering or phishing attacks. Let’s breakdown what a social engineering and phishing attacks are. Social engineering is the art of manipulating people, so they give up confidential… Read more »

Ransomware Attacks

Businesses Lack of Training for Ransomware Attacks

Businesses are very aware of the consequences of ransomware attacks, but few have taken the necessary steps to prevent them from happening. According to a new survey of government employees by IBM, 73% of businesses are concerned about impending ransomware threats. However, they lack the training required for their employees to prevent ransomware attacks. From… Read more »

5 Ways Zoom Phones Enables Mobility and Business Continuity

5 Ways Zoom Phones Enables Mobility and Business Continuity

Businesses that rely on a legacy on-premise PBX for their phone system face unique challenges, especially for a work remote situation. Most of the time, these systems do not offer employees the mobility that is desired or business continuity that most companies require to keep business operations running consistently. On-premise phone systems by nature make… Read more »

Cloud-Based Business Email Compromise Scams

Cloud-Based Business Email Compromise Scams

The FBI’s Internet Crime Complaint Center (IC3) published an alert warning that criminals are exploiting cloud-based email services to carry out business email compromise (BEC) scams. The attackers are using phishing kits that impersonate email services like Google’s G Suite or Microsoft’s 365 to compromise corporate email accounts. Once they gain access to an account,… Read more »

3 Lessons COVID-19 Taught Us About Cybersecurity

3 Lessons COVID-19 Taught Us About Cybersecurity

COVID-19 has changed the world we live in entirely. There is a direct correlation between the treatment of cybersecurity and COVID-19. These are three lessons that COVID-19 taught us about cybersecurity: People not heeding the COVID-19 warnings = people not heeding the cybersecurity warnings COVID-19 response = IT response to incident handling Wash your hands… Read more »

Changes Coming to Authentication for Microsoft 365 Email Service

Changes Coming to Authentication for Microsoft 365 Email Service

In late 2021, Microsoft 365 will no longer support legacy authentication. Modern authentication means OAuth 2.0, where applications request access tokens from Azure Active Directory rather than using username and password to connect. This enables multi-factor authentication, restrictive access policies, and other security beneficial features. In September 2019, Microsoft stated that from the October date,… Read more »

The 11 Biggest Issues CIOs Face Today

The 11 Biggest Challenges CIOs Face Today

CIOs have more than their share of concerns keeping them up at night, from changing cyber threat landscape, help desk support, infrastructure updates, and retraining IT talent.  CIOs say they’re more concerned with how to protect data, as organizations struggle with new privacy regulations. Executives focusing on securing their cloud-based assets across multiple cloud environments,… Read more »