Posts filed under: #vulnerability

New PA Bill to Allow National Guard to Counter Cyber-Attacks

The State of Pennsylvania unanimously passed House Bill 2412 on 4/27/2022, to allow the use and expertise of the Pennsylvania National Guard to... Read More

Your Employees Are Your Organization's Biggest Risk to Cybercrime

The workplace environment has seen a drastic shift in the attitude about the value of a physical workspace. For some, return-to-work plans... Read More

How Cyber Insurance Can Protect Your Business

Cyber insurance offers businesses protection from financial losses created by cyber-attacks, including system hacking, data breaches, and ransomware... Read More

Business Email Compromise

Small and medium-sized businesses are frequently targeted by Business Email Compromise (BEC) scams that attempt to deceive victims into sending... Read More

How Vulnerability Scanning Can Protect Your Organization

What was the last company you heard about that got hacked? Do you know how the attackers got in? Frequently the first step in an attack is to scan... Read More

Mitigate the Risks of Business Email Compromise Attacks

We know you've seen the headlines: Cyberattacks are hitting enterprises at unprecedented rates. And business email compromise (BEC) attacks, in... Read More

Do’s and Don’ts of SMB Cybersecurity

It's no secret that the COVID-19 pandemic has severely impacted small and medium-sized businesses (SMBs). While dealing with decreased foot traffic,... Read More

Making Authentication the Core of Email Security

The Zero Trust model is founded on a simple concept, "trust no one and nothing." In practical terms, organizations that adopt the Zero Trust model... Read More

Five Tips for Keeping Your Mobile Data Safe and Secure

Mobile security should be a top priority for any smartphone user. Phones have quickly evolved in recent years to store and share our most sensitive... Read More

Public Wi-Fi Can Make You Vulnerable to Hackers

The same features that make free Wi-Fi hotspots desirable for consumers make them desirable for hackers, namely, that it requires no authentication... Read More