What’s lurking the digital shadows? Organizations are often aware of their digital or internet footprint. That is, the footprint they […]
What’s lurking the digital shadows? Organizations are often aware of their digital or internet footprint. That is, the footprint they […]
Watch out for Business Email Compromise In 2013 the FBI noticed a new attack that they called business email compromise […]
Bitlocker and Solid State Drives To keep devices secure, many companies rely on a product from Microsoft called Bitlocker. Bitlocker […]
What are B2B VPN Many companies need direct connectivity with other trusted organizations to do business. A cost-effective way to […]
The United States Computer Emergency Readiness Team (US-CERT) and the National Cybersecurity and Communications Integration Center (NCCIC) recently posted a […]
Ransomware is a type of malware that infects a computer and locks their files by encrypting them so they cannot […]
When discussing network security, firewalls are the number one item that comes up. That is because they often are a […]
Attackers who are trying to break into a system know that the weakest line of defense is often the people. To get to these people attackers use schemes such as phishing, spear phishing, whaling, and watering hole attacks. We will look at each of those attacks and tell you ways to protect yourself against them.
In 2017 the amount of cyber attacks had doubled from 2016, and 2018 is looking to be just as bad. Threats are always changing as attackers adapt to defeat modern security controls. Here are some modern threats that any business may face.
Give us a call or drop by anytime, we endeavour to answer all enquiries within 24 hours on business days.