Join our team on Thursday, Oct 22nd at 11:30 am for a lunch and webinar on cybersecurity! Our team will be sharing simples steps that you can take to protect yourself and your business from an attack. Register with this link: https://abacustechnologies.zoom.us/webinar/register/7016027866981/WN_NxDTeqeSSq64WfmOnttNgw
Tag: Cybersecurity
Seven Tips to Optimize Security
As Data breaches continue, phishing attacks are on the rise, and the threat landscape is continuously changing. In the aftermath of a breach, we find that it’s not the lack of tools or information that contributed to the event, but rather the available resources were not deployed appropriately. We are breaking down seven tips to… Read more »
Businesses Lack of Training for Ransomware Attacks
Businesses are very aware of the consequences of ransomware attacks, but few have taken the necessary steps to prevent them from happening. According to a new survey of government employees by IBM, 73% of businesses are concerned about impending ransomware threats. However, they lack the training required for their employees to prevent ransomware attacks. From… Read more »
3 Lessons COVID-19 Taught Us About Cybersecurity
COVID-19 has changed the world we live in entirely. There is a direct correlation between the treatment of cybersecurity and COVID-19. These are three lessons that COVID-19 taught us about cybersecurity: People not heeding the COVID-19 warnings = people not heeding the cybersecurity warnings COVID-19 response = IT response to incident handling Wash your hands… Read more »
6 Educational Cybersecurity Resources for Kids
Kids and teens around the country are staying home and adapting to a new virtual school environment due to COVID-19. While the adjustment is fun for a while, the same routine can become tedious, and students may be spending more free time browsing online. We have listed 6 educational cybersecurity resources available for kids of… Read more »
What are the top 5 CIS Controls?
Join our team on Monday, July 13th at 11:30 am for a lunch and learn webinar on what are the top 5 CIS Controls and why you need to know them. Register here. As the threat landscape and data breaches continue to grow in size and scale, organizations now more than ever need actionable ways… Read more »
13 Signs that You have been Hacked
In today’s threat landscape, hackers are continually changing their tactics. While some hackers will let you know with alerts and messages, others can be harder to detect. We are breaking down a few signs that you have been hacked that you might want to get your device assessed for a breach. Ransomware message. One of… Read more »
Coronavirus Impact on Cybersecurity
Coronavirus is going to have a significant impact on the economy, global trade, and business operations. With so many businesses transitioning to a remote workforce, there will be a major impact on IT decisions and cybersecurity challenges that companies will face due to the sudden shift of a remote workforce. We are breaking down the… Read more »
Dubunking 10 Cybersecurity Myths
Cybersecurity is now one of the most essential parts of doing business. Companies are investing in cyber defense and training, but there are a few misconceptions and myths about cybersecurity that should be avoided. We are breaking down the top 10 cybersecurity myths: Business is too small for a cyber-attack. Most small and mid-sized businesses… Read more »
5 Reasons Why a Security Risk Assessment is Important
Regardless of the size of your business, the need for a technology security risk assessment cannot be ignored. Many organizations do not have one performed, which increases the probability that they will experience a data breach. That is why we are breaking down the top 5 reasons why security risk assessment is important for your… Read more »