Combatting Security Fatigue

Security Fatigue

I know I keep on going on about security and you keep getting prompted for another password change or to install another security update. These are frustrating and can lead to cybersecurity fatigue. You can’t stop securing your tech and doing updates, but what can you do to combat both your own and your employees annoyance with the process. Continue reading

Protecting Yourself From Identity Theft

Many everyday objects can lead to identity theft and they can often get overlooked because your focus is on your computers and cloud accounts. Yes, it is important to have strong passphrases and use antivirus on your PC, but you also need to be wary of other ways that hackers and thieves can get access to your personal data. Here are six common things that criminals can use to steal your information. Continue reading

Are Your Cloud Accounts Configured Correctly?

Cloud Account Configurations

Misconfiguration of cloud solutions is often overlooked when companies plan cybersecurity strategies. Cloud apps are typically quick and easy to sign up for and the users assume that they do not need to worry about security because it is handled by the provider. This is an incorrect assumption because cloud security is a shared model. The provider of the solution handles securing their backend infrastructure and the user is responsible for configuring security settings in their actual account. The problem with misconfiguration is huge and is the number one cause of cloud data breaches. Continue reading

What Is Cybersecurity Insurance?

Cyber Insurance

While cybersecurity insurance is still a pretty new concept for many small businesses, it has been around since the 1990s to provide coverage for mainly large enterprises. Back then it covered things like data processing errors and online media. Since that time, the policies for this type of liability coverage have changed. Continue reading

Cybersecurity Attack Trends To Look Out For In 2023

Cyber Security

2023 is just about here, and you should start to plan for the new year. Sixty-eight percent of surveyed business leaders feel that cybersecurity risks are getting worse and this is the area you should start to take seriously (if you haven’t already) and look at the attack trends. Continue reading

What A Data Breach Looks Like

Security breaches

When most businesses get breached, the business owners don’t know until well after the event. This blog article aims to show some of the signs of a data breach so that you can help you mitigate the damage. Continue reading

Common Cyber Security Myths Debunked

Cybersecurity Myths Debunked

In many areas there are myths that we accept as fact. Some of these are actually quite dangerous: this article debunks some cybersecurity myths so that you can keep your business safe. Continue reading

What is Reply-Chain Phishing?

Reply Chain Phishing

It seems you can’t read an article on cybersecurity without the work “phishing” being mentioned. Thats due to phishing being the number one delivery vehicle for cyberattacks. Continue reading

What Is Smishing?

What Is Smishing

You probably now receive a lot more text messages today from companies that you did a few years ago. This is due to businesses trying to bypass full inboxes. Retailers have joined the trend and are urging customers to sign up for shipping alerts via SMS. The medical industry has also joined the trend with doctors and dentists sending out SMS appointment reminders. Continue reading