What’s lurking the digital shadows? Organizations are often aware of their digital or internet footprint. That is, the footprint they […]
What’s lurking the digital shadows? Organizations are often aware of their digital or internet footprint. That is, the footprint they […]
Watch out for Business Email Compromise In 2013 the FBI noticed a new attack that they called business email compromise […]
Bitlocker and Solid State Drives To keep devices secure, many companies rely on a product from Microsoft called Bitlocker. Bitlocker […]
What are B2B VPN Many companies need direct connectivity with other trusted organizations to do business. A cost-effective way to […]
The United States Computer Emergency Readiness Team (US-CERT) and the National Cybersecurity and Communications Integration Center (NCCIC) recently posted a […]
In case you missed our webinar last week, Brian and I talked about security assessments and how they fit into […]
Ransomware is a type of malware that infects a computer and locks their files by encrypting them so they cannot […]
When discussing network security, firewalls are the number one item that comes up. That is because they often are a […]
When asked about security practices many organizations are quick to respond; “We do a security assessment every month [or quarter].” But what do you mean by security assessment? Often, this security assessment is a network or vulnerability scan performed by an automated appliance or service. This is not a security assessment.
Attackers who are trying to break into a system know that the weakest line of defense is often the people. To get to these people attackers use schemes such as phishing, spear phishing, whaling, and watering hole attacks. We will look at each of those attacks and tell you ways to protect yourself against them.
Give us a call or drop by anytime, we endeavour to answer all enquiries within 24 hours on business days.