Blog posts specifically about cybersecurity issues that face us today.

Levin and Pangilinan PC Teams Up with Sagacent for IT Managed Services

Levin and Pangilinan PC Teams Up with Sagacent for IT Managed Services
Levin and Pangilinan PC is an elite immigration law firm based in San Francisco, California. For close to 30 years, ...

Connected Devices Can Jeopardize Your Business Security

Connected Devices Can Jeopardize Your Business Security
The Internet of Things (IoT) isn't just a futuristic vision from science fiction movies. It's already woven into the fabric ...

Supply-chain Vulnerabilities—Mitigation for Manufacturers

Supply-chain Vulnerabilities—Mitigation for Manufacturers
In the intricate supply chains of modern manufacturing, each link in the chain is potentially vulnerable to hackers determined to ...

Why Hackers Love Holiday Cyberattacks and How To Stay Safe

Why Hackers Love Holiday Cyberattacks and How To Stay Safe
Did you know that hackers love the holidays? It's true. This festive season, with its twinkling lights and holiday cheer, ...

SolarWinds Orion Hack Explained – Are CISOs Now on the Hook?

Solar Winds Hack
The SolarWinds Orion hack reportedly launched by Russian espionage hacker group Dark Halo was the most wide-ranging attack in the ...

What Should I Do if My Data Is Compromised on a Hacked Site?

data compromised
If your data has been pwned, taking immediate action to protect your accounts is crucial. You should change your password(s) ...

Why Are There So Many Account Takeovers of Social Media Accounts?

social media account
Social media account takeovers are a serious problem, and their prevalence is only increasing. In 2022, the Identity Theft Resource ...

Zero-Trust Security Model for Confident and Secure Businesses

zero trust security
The Zero Trust security model is a way to deal with the problem of perimeterless security in an age of ...

The Phase-Out of Passwords and the Rise of Passkeys

passkeys and passwords
Passwords have been the standard authentication method for decades but are becoming increasingly insecure. Passwords can be easily guessed, stolen, ...

Social Engineering Hacking—Attack Types and Examples

social engineering hacking
Security tactics such as IT audits, pentesting, vulnerability scanning, reports and alerts are highly sophisticated. Yet, social engineering hacking is ...

Why Cybersecurity Frameworks Are Crucial for Businesses

cybersecurity
Cyberattacks are becoming increasingly sophisticated and costly, and businesses of all sizes need to take steps to protect themselves. One ...

Business Email Compromises Are on the Rise. Here’s How To Not Be a Victim

Business email compromises (BECs)
Business email compromises (BECs) are on the rise and now occur frequently. BECs are breaches of email accounts, and are ...

What To Do if You Think Your Business Was Hacked

data breach
A data breach is a serious incident that can have far-reaching consequences for businesses and individuals. When a company's data ...

How the Rise of Remote Work Increased Security Risks

Remote Work Increased Security Risks
The reasons why remote work can increase the risk of a cyberattack are not always the ones you might expect: ...

Cybersecurity Insurance Hacks Out an $80 Billion Niche

cybersecurity insurance
Cybersecurity insurance companies are paying close attention to security researchers, pentesters and even malicious hackers. While government legislation grinds along, ...

What is Penetration Testing in Cybersecurity? | Pen Testing

what is pentesting in cybersecurity?
What is penetration testing in cybersecurity? This blog post defines pentesting and explains the demand for it. It also sets ...

Endpoint Detection and Response: Network and Device Protection

endpoint detection and response
Endpoint detection and response methodology and technology protect your network, servers and devices from malicious hackers. But, what is it ...

What is co-managed IT and when is it a good fit?

co-managed IT
As businesses grow and the pace of technology accelerates, IT teams can quickly become overwhelmed. How do they keep networks, ...

Best IT security practices for working from home

Best IT security practices for working from home
I’m one of those fortunate people whose company supports a hybrid work environment. This means that I generally work from ...

SMB manufacturers: Are you a reliable business partner

SMB manufacturers: Are you a reliable business partner
Manufacturing is in the cybercriminal’s crosshairs With today’s interconnected supply chain, partners of your manufacturing business are not just working ...

Co-managed IT: Like Ice Cream with Toppings – Better Together!

Co-managed IT: Like Ice Cream with Toppings - Better Together!
Co-managed IT is like ice cream - plain is good, but with toppings it's better. With shared responsibilities, expertise and ...

How Hashtags Can Lead to Being Hacked

how to create hacked passwords
Cybersecurity is a growing concern for many businesses and individuals, and the current statistics related to cybercrime are startling. Consider ...

What is Cryptojacking? Everything You Need to Know

what is cryptojacking and what do I need to know
In today's digital age, cybersecurity is something that needs to be on everyone's mind. Especially when hackers and criminals are ...