Blog

Ransomware and Social Engineering Still Top Threats According to Verizon Data Breach Investigation Report

Ransomware and Social Engineering

Since back in 2008 Verizon has been putting out a report each year called the Data Breach Investigation Report (DBIR).  In 2013 they first wrote about ransomware.  Social engineering was already happening and growing in popularity with bad actors.  The latest edition of DBIR shows that 9 years later Ransomware and Social Engineering are still […]

Retired FBI Agent Cybercrimes Division Talks Cyber Security

FBI Cyber Security

I recently attended an IT industry conference where the topics were understandably cyber security heavy.  One of the speakers that stuck out to me was Scott Augenbaum.  Scott is a retired FBI agent that worked in the cybercrimes division for the last 20 years and has recently retired.  A few things from his address stuck […]

Reducing Human Error

Reducing Human Error

As the saying goes, you’re only as strong as your weakest link, and in the case of cybersecurity, your weakest link is humans.  With the new security challenges brought about by remote work, humans have become more of a cyber risk than ever. As of 2022, 88% of data breaches are caused by human error. […]

Threat Report – Emotet 2.0

EMOTET attack

For several years bad actors have been using Emotet malware and its variants in large scale phishing attacks.  These attacks are meant to compromise business email accounts and then allow them to deliver a payload of ransomware.  Some recent updates from Microsoft have made those attacks less effective, so the hackers have had to pivot. […]

Cyber Security Training

Man pointing at chalk board with word, security written on it

The weakest link in most IT security plans is frequently your employees.  Cyber security training can help them recognize threats and not fall for that phishing scam.  Without it, a misguided click can subvert a lot of the other security you’ve worked hard to put in place. What is Cyber Security Training? People make mistakes.  […]

Microsoft Secure Score

Microsoft Secure Score

Businesses should always be on the lookout for ways that they can increase their security posture.  Microsoft is aware of this and wants to help.  They’ve created some built in functionality within Office 365 that assists organizations in improving their security.  Here’s what it is and how it can help your business. What is Microsoft […]

Cyber Liability Insurance – IT Security Requirements are Increasing

Man holding symbol that says cyber insurance

With the rise of ransomware and increasing automated bot attacks the need for cyber liability insurance has never been higher than right now.  Business owners often underestimate the cost of a breach or outage due to an attack.  Having the right Cyber Liability insurance in place can help protect your business if you qualify. Security […]

Top 5 Phishing Threats You Need to Know About for 2022

Phishing Scam

Moving into 2022, cybersecurity is a hot topic. With hacking and data breaches on the rise, it is more important than ever for individuals and businesses to protect their digital information. You may think phishing is a hacking tool of the past, but hackers and cybercriminals still use phishing and social engineering to steal personal […]

2021 Cybersecurity Year In Review

woman at computer

In 2021, cybersecurity continued to be a top concern for businesses and individuals alike. Despite increased awareness and investment in cybersecurity solutions, there were still many high-profile cyberattacks that affected both organizations and individual users. When we see these high-profile attacks on the news, it’s important to use them as case studies so we can […]

What is HIPAA Compliance and Why is it Important?

HIPAA Compliance and healthcare

HIPAA compliance is a critical part of protecting the privacy of patient information. It is also important for healthcare organizations to maintain HIPAA compliance in order to avoid potential fines and penalties. What is HIPAA Compliance? The Health Insurance Portability and Accountability Act (HIPAA) was created in an effort to standardize healthcare information in the […]