Blog

Answering your questions about security, strategy, cloud, budgeting, service, culture, and more.

Top 10 Tips to Avoid Social Engineering Hacks

  Did you know that 95% of all successful cyberattacks begin with a phishing scam? And that’s just one type of social engineering, a hacking method that puts us, our families, and our businesses at risk on a daily basis. The unfortunate truth is that our...
Read More

The Dangers of Online Shopping and How to Stay Safe [Video/Infographic]

This past Cyber Monday, consumers spent nearly $8 billion online, with over 54% of purchases made directly from smartphones. Two days prior, on Black Friday, online sales surpassed $6 billion. The holidays are, of course, prime time for purchases in...
Read More

What is "Vishing" and How Can You Stay Protected?

Previously we’ve published several articles about email phishing scams and how to best avoid them. We even put together an infographic on the Top 5 Phishing Red Flags, which you can take a look at here. What we haven’t yet discussed is a different kind...
Read More

Top 5 Phishing Red Flags (Infographic)

Did you know that 95% of successful cyberattacks begin with a phishing scam?   “Phishing” is an umbrella term used to describe an email scam where the sender tries to trick you into handing over valuable information such as account credentials, banking...
Read More

Key Elements of a Successful Security Awareness Training Program

Over the past 25 years our company has seen cyber threats evolve in a nasty way. Last year a startling 4,000 ransomware attacks occurred every day. One out of every 131 emails sent was malicious. Businesses with fewer than 1,000 employees now have a 90%...
Read More

Top Cybersecurity Stats Every Executive Should Know for 2018

As we make our way into 2018, one of the questions we’re hearing from our clients is this: how can we expect the cybersecurity landscape to change, and what will this mean for our business?   Unfortunately, recent data indicates that cyberattacks will...
Read More

How to Choose the Right Cyber Liability Insurance Plan for Business

Not long ago we published an article that discusses what cyber liability insurance is, what it covers, what it doesn’t, and whether or not it might make sense for your business to invest in. In this piece, we touched briefly on the matter of working with...
Read More

Phishing vs Spear-Phishing vs Email Spoofing: How to stay protected

If you’re anything like our clients, you’re worried about being vulnerable to email scams. Our company has been providing IT support for over 25 years, and never before have we seen this level of concern about phishing, spear-phishing, and email spoofing...
Read More

Is the Cloud Secure?

It's very common for organizations to avoid cloud computing out of legitimate concern for their data’s safety. "What if someone gains access to my environment?" "Since it's not in my control, what if something goes wrong?” "Wouldn't my data be more...
Read More

Is Data Safe in the Cloud?

There’s a very real separation anxiety that comes with surrendering your network to an outside provider; putting the fate of your data in someone else’s hands is, quite simply, a frightening concept.   In fact, this is such a common occurrence that we’ve...
Read More