Free Security Assessment

Submit

Blog

Products We Love – New Services

As we wrap up the series on the “Products That We Love” we look at new services that are coming out, and which can impact a business in a positive way.  These are the ways in which you do digital marketing and ads, and overall security awareness training. Microsoft Advertising – BING Gone are the days when ...

Read More

FBI: Password Length Much More Important Than Password Complexity

We all use passwords. We use them for our phones, our computers, our e-mail, and just about every other kind of personal account. Unfortunately, many of us use simple passwords, such as “Password1” or “1234,” because they’re easier to remember. Some of us even reuse the same simple password for multiple accounts. If you use a ...

Read More

What Is Self-Leadership & Why It Matters

You cannot lead others if you’re first not willing to lead yourself! But this raises the important question, “What does self-leadership even look like?” We dive into this topic and lay out 3 important practices that self-leaders do. We also dive into the leadership pyramid and why, before you can manage a team, a cause, ...

Read More

Products We Love – Migration Tools

Introduction As this month moves onwards, we continue with our theme of the products we love.  In our last blog, we examined two internal training tools that be used quite easily and effectively for both your IT Security staff and non-IT employees.  Everybody, to some degree or another wants to stay ahead of the Cybersecurity curve, ...

Read More

Cybersecurity Hot Topics – Internet Crime Complaint Center

Business Email Compromise (BEC) In 2019, the IC3 received 23,775 Business Email Compromise (BEC) / Email Account Compromise (EAC) complaints with adjusted losses of over $1.7 billion. BEC/EAC is a sophisticated scam targeting both businesses and individuals performing a transfer of funds. The scam is frequently carried out when a subject compromises legitimate business e-mail accounts ...

Read More

Valentine’s Day Phishing Heartbreaks

It is time to remind your users that heartless con artists use social engineering tactics to trick people looking for love.  The FBI's Internet Crime Complaint Center warns every year that scammers use poetry, flowers, and other gifts to reel in victims, the entire time declaring their "undying love." These callous criminals -- who also troll ...

Read More

The Products That We Love

Introduction February is deemed, of course, to be the month that we share and express our love for, and to, our spouses and families.  But the love does not just have to stop here!  We can share our love with the products and the services that we enjoy the most, especially when it comes to technological ...

Read More

Software Licensing Audits – What They Are

Introduction A software license audit is a check of your usage of software licenses. All software licenses include an audit provision.   Software vendors exercise their rights to conduct audits to counter a growing software piracy issue for perpetual and subscription software. What Is a Software Licensing Audit? A Software Licensing Audit can be specifically defined as follows:  the ...

Read More

Software Licensing Audits – What They Are

Introduction A software license audit is a check of your usage of software licenses. All software licenses include an audit provision. Software vendors exercise their rights to conduct audits to counter a growing software piracy issue for perpetual and subscription software. What Is a Software Licensing Audit? A Software Licensing Audit can be specifically defined as follows: the ...

Read More

How To Plan Your IT Budget For 2020

Introduction As we enter 2020 with high hopes and grand aspirations, we may have some questions that need answers. One of the key questions that gets asked by just about every department in a large business is:  “How much do I get to spend this year?”  This is where the area of resource allocation comes into ...

Read More