Blog

MOST POPULAR

Warning: Your Employees Have Your Sensitive Data in Their Cloud

Our last blog post alerted you to the dangers of combining employees who take technology for granted with a weak (or non-existent) BYOD policy. However, that’s not the only risk a tech-savvy workforce can pose to your data. A survey by cybersecurity vendor CipherCloud found that a jaw dropping 86 percent of cloud applications being used in the enterprise, from…

How to Harness the Power of Cloud Services for Cybersecurity Conscious Organizations

According to a recent study by Verizon, from survey to survey, the trend is clear – the cloud is now mainstream. Verizon research found that 65% of enterprises surveyed are using cloud services, and they are increasingly trusting more complex and mission-critical workloads to it. They also found that 72% expect to put more than half their workloads in the…

The Future of Compliance and Data Governance is Here

The worldwide shift to a hybrid workplace has pushed us all to embrace ubiquitous connectivity. Those new connections have helped us become more collaborative; routinely editing and sharing documents in real-time from wherever we happen to be working. Instant messaging went from being a tool of convenience to a cornerstone of communication. People in business, operations, and technical roles became…

Secure your Systems with Smart Solutions from Microsoft

Securing your systems with a data driven, human-guided security approach allows your business to detect and respond to attacks more quickly and accurately. Check out this latest infographic from Microsoft, it outlines how the global network of real-time threat intelligence continues to evolve, anticipate, and stay ahead of risks while delivering on four key security pillars that ensure enterprise-grade security. Have…

Integrated Cyber Threat Protection with Microsoft

Never in our lifetime has cybersecurity been more critical. Review this infographic to learn how Microsoft can make the tasks of protecting virtual machines, data storage, and cloud native services against common threats easier. With integrated security information and event management (SIEM) and extended detection and response (XDR), you get comprehensive threat protection across devices, identities, apps, email, data, and…

New Security Features in Windows 11 Will Protect Hybrid Work

Attackers haven’t wasted any time capitalizing on the rapid move to hybrid work. Every day cybercriminals and nation-states alike have improved their targeting, speed, and accuracy as the world adapted to working outside the office. These changes have put “cybersecurity issues and risks” at the top of the list when it comes to worries or concerns for business decision-makers in…

Cybercriminals Are Using a New Tool to Carry Out BEC Scams

The FBI recently issued an alert about a new tool that cybercriminals are using in business email compromise (BEC) scams. Find out what this new tool is and how cybercriminals are using it. In February 2022, the US Federal Bureau of Investigation (FBI) issued an alert about a new tool that cybercriminals are increasingly using to carry out business email compromise (BEC)…

Five Best Practices for Cloud Security

The volume of security signals is overwhelming. And the combination of legacy and siloed tools makes it even harder for defenders to protect against today’s sophisticated attacks. Many businesses are not yet protecting their cloud assets to the same extent that their on-premises assets are protected—and hiring security talent is an ongoing challenge. As a result, many organizations have large…

A Tailored Journey to the Cloud

The ability for employees to work from anywhere and still be able to communicate and collaborate remains business critical around the world. A recent survey showed 80% of customers intend to accelerate their digital transformation and 60% indicate security and compliance budgets have gone up to better defend customer’s infrastructures in these remote or hybrid work scenarios. Check out this…

Don’t Leave Your Cloud App Data Vulnerable

Many companies use cloud apps like Microsoft 365 and Salesforce without adequately protecting the data within those apps. Learn why this is problematic and how businesses can remedy the situation. When cloud computing was first introduced, most businesses were reluctant to try the apps being offered by public cloud service providers. Companies were mainly concerned about whether their data and…

QR Codes in the Time of Cybercrime

QR codes have been around for many years. While they were adopted for certain niche uses, they never did quite reach their full potential. However, in recent years, with lockdown and the drive to keep things at arms length, QR codes have become an efficient way to facilitate contactless communications, or the transfer of offers without physically handing over a…

Reimagine your Digital Endpoint Assets

Growing concerns about employee experiences—including securing mobile devices and working with flexibility—call for endpoint modernization. The value in Microsoft 365 is its innovation in secure, cloud-connected management as well as its awareness of employee satisfaction (including the acceleration of onboarding of all workers). Take stock in your endpoint estate and start using modern products like Cloud Configuration and Endpoint Manager…

Transition to the Cloud with Microsoft’s Deployment Checklist

Businesses rely on cloud transformation for the stability and agility it offers to their operations. Microsoft 365 enables this transformation by realizing modern work environments where users are productive and secure while working from anywhere. Review the infographic and get started today with this 5-step deployment checklist. Learn how you can rapidly deploy Teams, secure access, provide employees with top-notch support, and then contact…

3 IT Trends That Every Business Should Know About in 2022

Although technologies and their impacts can change quickly, adjusting business operations accordingly often takes time. Thus, knowing about important IT developments sooner rather than later is important. It can give companies the time they need to avoid potential problems or take advantage of opportunities.  Here are three IT trends that will affect all organizations, no matter their size or industry: …

States’ Data Privacy Laws- What to Expect in 2023

Several states will start enforcing their data privacy laws in 2023. Find out which states and why your business needs to know about those laws. Following California’s lead, Virginia and Colorado have passed state laws designed to protect the data privacy of their citizens. Virginia’s  Consumer Data Protection Act  will go into effect on January 1, 2023, whereas the  Colorado…

Cloud Migration and Improving Cybersecurity are Top Priorities for Businesses

Fact: 7 in 10 IT leaders believe cloud migration is a priority when future-proofing digital infrastructure. Also, fact: 37 percent of companies plan to move business critical applications to the cloud. And almost half (47 percent) of IT infrastructure globally is already on the cloud. Growth in the number of user devices and cloud resources mean organizations must be aware of…

The FTC is Pushing for More Privacy Protection

The FTC has stated that it’s willing to pursue initiatives that will increase consumer privacy on its own, but it may not be possible to do so without congressional support. Its first steps would likely include increasing its scrutiny of online advertising and exploring new rules for the collection and use of consumer data, although the FTC hasn’t yet announced…

What You Need to Know About Cybersecurity Compliance

Due to the increasing number of cybersecurity-related laws, regulations, and standards, many companies might discover that they now need to comply with one or more of them. Here is what you need to know if your business makes that discovery.  When the European Union’s (EU’s) General Data Protection Regulation (GDPR) first took effect, it was touted as the most important…

GoDaddy Data Breach Exposes Million Users

GoDaddy’s investigation shows that the attack began on September 6, 2021, but wasn’t discovered until November 17. It also reported that a third party had accessed its provisioning system in GoDaddy’s legacy code base for its Managed WordPress hosting environment. This system is the process by which GoDaddy sets up its customers with their new hosting services, which involves assigning them server…

3 of the Most Troubling Cyberattacks in 2021

Read time: 60 seconds
The year 2021 was a busy year for cybercriminals — and for the US Federal Bureau of Investigation’s (FBI’s) Internet Crime Complaint Center. “IC3 saw complaints increase nearly 70% between 2019 and 2020,” said the FBI. “The latest numbers indicate 2021 may be another record year.”  One particularly telling number was reached back on May 15, 2021. On that day, the…

Blog

MOST POPULAR

Multifactor Authentication FAQs

Multifactor authentication (MFA) is one of the best, yet often misunderstood tools that companies can use to fend off cybercriminals trying to compromise business accounts. It blocks 99.9% of account compromise attacks. It also helps thwart automated bot, phishing, and targeted attacks.  To jumpstart your learning curve, here are the answers to some frequently asked questions about MFA.  What is MFA? MFA is…

How Microsoft 365 can Help Complete your Zero Trust Security Model

Zero Trust is a newer security model that assumes breach and verifies each request as though it originated from an uncontrolled network. Regardless of where the request originates or what resource it accesses, the Zero Trust model teaches us to “never trust, always verify.” Watch this video to learn how Microsoft 365 Business Premium can help keep your company’s sensitive…

The Future of Compliance and Data Governance is Here

The worldwide shift to a hybrid workplace has pushed us all to embrace ubiquitous connectivity. Those new connections have helped us become more collaborative; routinely editing and sharing documents in real-time from wherever we happen to be working. Instant messaging went from being a tool of convenience to a cornerstone of communication. People in business, operations, and technical roles became…

Secure your Systems with Smart Solutions from Microsoft

Securing your systems with a data driven, human-guided security approach allows your business to detect and respond to attacks more quickly and accurately. Check out this latest infographic from Microsoft, it outlines how the global network of real-time threat intelligence continues to evolve, anticipate, and stay ahead of risks while delivering on four key security pillars that ensure enterprise-grade security. Have…

Strategic, Reliable, and Secure. Learn more about our services.

Integrated Cyber Threat Protection with Microsoft

Never in our lifetime has cybersecurity been more critical. Review this infographic to learn how Microsoft can make the tasks of protecting virtual machines, data storage, and cloud native services against common threats easier. With integrated security information and event management (SIEM) and extended detection and response (XDR), you get comprehensive threat protection across devices, identities, apps, email, data, and…

New Security Features in Windows 11 Will Protect Hybrid Work

Attackers haven’t wasted any time capitalizing on the rapid move to hybrid work. Every day cybercriminals and nation-states alike have improved their targeting, speed, and accuracy as the world adapted to working outside the office. These changes have put “cybersecurity issues and risks” at the top of the list when it comes to worries or concerns for business decision-makers in…

Cybercriminals Are Using a New Tool to Carry Out BEC Scams

The FBI recently issued an alert about a new tool that cybercriminals are using in business email compromise (BEC) scams. Find out what this new tool is and how cybercriminals are using it. In February 2022, the US Federal Bureau of Investigation (FBI) issued an alert about a new tool that cybercriminals are increasingly using to carry out business email compromise (BEC)…

Five Best Practices for Cloud Security

The volume of security signals is overwhelming. And the combination of legacy and siloed tools makes it even harder for defenders to protect against today’s sophisticated attacks. Many businesses are not yet protecting their cloud assets to the same extent that their on-premises assets are protected—and hiring security talent is an ongoing challenge. As a result, many organizations have large…

A Tailored Journey to the Cloud

The ability for employees to work from anywhere and still be able to communicate and collaborate remains business critical around the world. A recent survey showed 80% of customers intend to accelerate their digital transformation and 60% indicate security and compliance budgets have gone up to better defend customer’s infrastructures in these remote or hybrid work scenarios. Check out this…

Don’t Leave Your Cloud App Data Vulnerable

Many companies use cloud apps like Microsoft 365 and Salesforce without adequately protecting the data within those apps. Learn why this is problematic and how businesses can remedy the situation. When cloud computing was first introduced, most businesses were reluctant to try the apps being offered by public cloud service providers. Companies were mainly concerned about whether their data and…

QR Codes in the Time of Cybercrime

QR codes have been around for many years. While they were adopted for certain niche uses, they never did quite reach their full potential. However, in recent years, with lockdown and the drive to keep things at arms length, QR codes have become an efficient way to facilitate contactless communications, or the transfer of offers without physically handing over a…

Reimagine your Digital Endpoint Assets

Growing concerns about employee experiences—including securing mobile devices and working with flexibility—call for endpoint modernization. The value in Microsoft 365 is its innovation in secure, cloud-connected management as well as its awareness of employee satisfaction (including the acceleration of onboarding of all workers). Take stock in your endpoint estate and start using modern products like Cloud Configuration and Endpoint Manager…

Transition to the Cloud with Microsoft’s Deployment Checklist

Businesses rely on cloud transformation for the stability and agility it offers to their operations. Microsoft 365 enables this transformation by realizing modern work environments where users are productive and secure while working from anywhere. Review the infographic and get started today with this 5-step deployment checklist. Learn how you can rapidly deploy Teams, secure access, provide employees with top-notch support, and then contact…

3 IT Trends That Every Business Should Know About in 2022

Although technologies and their impacts can change quickly, adjusting business operations accordingly often takes time. Thus, knowing about important IT developments sooner rather than later is important. It can give companies the time they need to avoid potential problems or take advantage of opportunities.  Here are three IT trends that will affect all organizations, no matter their size or industry: …

States’ Data Privacy Laws- What to Expect in 2023

Several states will start enforcing their data privacy laws in 2023. Find out which states and why your business needs to know about those laws. Following California’s lead, Virginia and Colorado have passed state laws designed to protect the data privacy of their citizens. Virginia’s  Consumer Data Protection Act  will go into effect on January 1, 2023, whereas the  Colorado…

Cloud Migration and Improving Cybersecurity are Top Priorities for Businesses

Fact: 7 in 10 IT leaders believe cloud migration is a priority when future-proofing digital infrastructure. Also, fact: 37 percent of companies plan to move business critical applications to the cloud. And almost half (47 percent) of IT infrastructure globally is already on the cloud. Growth in the number of user devices and cloud resources mean organizations must be aware of…

The FTC is Pushing for More Privacy Protection

The FTC has stated that it’s willing to pursue initiatives that will increase consumer privacy on its own, but it may not be possible to do so without congressional support. Its first steps would likely include increasing its scrutiny of online advertising and exploring new rules for the collection and use of consumer data, although the FTC hasn’t yet announced…

What You Need to Know About Cybersecurity Compliance

Due to the increasing number of cybersecurity-related laws, regulations, and standards, many companies might discover that they now need to comply with one or more of them. Here is what you need to know if your business makes that discovery.  When the European Union’s (EU’s) General Data Protection Regulation (GDPR) first took effect, it was touted as the most important…

GoDaddy Data Breach Exposes Million Users

GoDaddy’s investigation shows that the attack began on September 6, 2021, but wasn’t discovered until November 17. It also reported that a third party had accessed its provisioning system in GoDaddy’s legacy code base for its Managed WordPress hosting environment. This system is the process by which GoDaddy sets up its customers with their new hosting services, which involves assigning them server…

3 of the Most Troubling Cyberattacks in 2021

Read time: 60 seconds
The year 2021 was a busy year for cybercriminals — and for the US Federal Bureau of Investigation’s (FBI’s) Internet Crime Complaint Center. “IC3 saw complaints increase nearly 70% between 2019 and 2020,” said the FBI. “The latest numbers indicate 2021 may be another record year.”  One particularly telling number was reached back on May 15, 2021. On that day, the…
Menu