Blog

How to Secure Your Remote Workers

Introduction What was once a tranquil calm here in the United States just a few weeks ago has now turned into almost public hysteria.  We have seen volatility in the financial markets at unprecedented levels, and the American economy is systematically closing itself down from the outside world by making employees work from home for the ...

Read More

Cyber-Attack Hits U.S. Health Agency Amid Covid-19 Outbreak

We’re tracking the latest on the coronavirus outbreak and the global response. Sign up here for our daily newsletter on what you need to know. The U.S. Health and Human Services Department suffered a cyber-attack on its computer system, part of what people familiar with the incident called a campaign of disruption and disinformation that was ...

Read More

Safeguarding Healthcare for the Future with Zero Trust Security

In 2019, we saw a record number of information security breaches. According to the IBM X-Force Threat Intelligence Index 2020, a total of 8.5 billion records were compromised — three times the number from 2018. The healthcare industry saw its fair share of attacks and was the 10th-most targeted industry, accounting for 3 percent of all ...

Read More

Zero Trust & What It Means

Introduction There is no doubt that the Cybersecurity world is becoming more complex on a daily basis.  For example, there are newer variants that are coming out, Cyberattackers are being more deliberate in choosing their targets, it is even that much more difficult to tell the difference between a spoofed website and a real one, Social ...

Read More

The Workstation as a Service

Introduction In today’s business environment, you will still see many organizations that are using the traditional desktop computers and servers that are stored On Premises (aka “On Prem”).  This simply means that an employee has a traditional workstation that they log into, from which they can conduct their everyday job tasks, and that the IT department ...

Read More

Why Vendor Management Must Be A Cornerstone of Cybersecurity

When it comes to building a security program, one of the most frequently overlooked areas is that of vendor management. Organizations may focus significant resources on internal security, such as vulnerability scans, centralized log management, or user training, while not extending the same diligence towards their third parties. Therefore, organizations end up trusting the security ...

Read More

Products We Love – New Services

As we wrap up the series on the “Products That We Love” we look at new services that are coming out, and which can impact a business in a positive way.  These are the ways in which you do digital marketing and ads, and overall security awareness training. Microsoft Advertising – BING Gone are the days when ...

Read More

FBI: Password Length Much More Important Than Password Complexity

We all use passwords. We use them for our phones, our computers, our e-mail, and just about every other kind of personal account. Unfortunately, many of us use simple passwords, such as “Password1” or “1234,” because they’re easier to remember. Some of us even reuse the same simple password for multiple accounts. If you use a ...

Read More

What Is Self-Leadership & Why It Matters

You cannot lead others if you’re first not willing to lead yourself! But this raises the important question, “What does self-leadership even look like?” We dive into this topic and lay out 3 important practices that self-leaders do. We also dive into the leadership pyramid and why, before you can manage a team, a cause, ...

Read More

Products We Love – Migration Tools

Introduction As this month moves onwards, we continue with our theme of the products we love.  In our last blog, we examined two internal training tools that be used quite easily and effectively for both your IT Security staff and non-IT employees.  Everybody, to some degree or another wants to stay ahead of the Cybersecurity curve, ...

Read More