HTG Weekly Blog

 

2 min read

With New Threats Around the Globe, Cybersecurity is a Necessity

We are privileged to be living in a time where technology and science can aid us, and make our lives much easier and more efficient. The technology we use on a day-to-day basis allows us to do things we never thought possible. Living in a computer...

Read More

2 min read

Your Employees Are Your Organization's Biggest Risk to Cybercrime

The workplace environment has seen a drastic shift in the attitude about the value of a physical workspace. For some, return-to-work plans...

Read More

2 min read

How Cyber Insurance Can Protect Your Business

Cyber insurance offers businesses protection from financial losses created by cyber-attacks, including system hacking, data breaches, and ransomware...

Read More

2 min read

Important Tools to Think About When Implementing Cybersecurity

The workplace environment has seen a drastic shift in the attitude about the actual value of a physical workspace. Return to work plans post-pandemic...

Read More

3 min read

Information Security is a Management Issue

With what seems like a never-ending stream of cybersecurity attacks, corporate boards and executives are searching for that “silver bullet” to...

Read More

1 min read

Tips to Help Protect Against Social Engineering

You’ve gotten those extended car warranty calls. Or, perhaps an email alerting you of suspicious activity on your bank card? These are classic...

Read More

3 min read

Staying Cyber-Safe While Traveling

After two years of working from the spare bedroom converted office, many of us are hoping for more travel in 2022; business, leisure, both. Of...

Read More

3 min read

Business Email Compromise

Small and medium-sized businesses are frequently targeted by Business Email Compromise (BEC) scams that attempt to deceive victims into sending...

Read More

2 min read

How Vulnerability Scanning Can Protect Your Organization

What was the last company you heard about that got hacked? Do you know how the attackers got in? Frequently the first step in an attack is to scan...

Read More

1 min read

Understanding Insider Threats

Cybersecurity has increasingly emerged with these priorities as companies grapple with pandemic-inspired economic uncertainty, operational...

Read More