January 27, 2021

What Is Social Engineering And How Does It Work


On the TV show Jimmy Kimmel Live!, a segment called “What is Your Password?” shows what happens when a correspondent on the street asks people what their online passwords are. Surprisingly, some people do give out their entire passwords after being prompted with questions. Although the segment is funny, it also shows you how easily […]


Read more

What Do I Do if My Office 365 Account Has Been Hacked


Among Office 365 customers, it is fairly common to get security support requests for remediating compromised accounts. When hackers manage to obtain the password for an Office 365 account, they would have access to information directly coming from a member of a specific organization, posing plenty of dangers for internal and external contacts alike.  So […]


Read more

What Is an EDR Tool?


Business networks are always a favorite target for different cyberattacks, which is why it’s important to find new ways to protect your network. One way you can do this is by adding a new layer of protection – like EDR – to the security system. To find out how EDR tools improve the company’s security […]


Read more

What Should Cybersecurity Awareness Training Include


For many businesses, data is almost as important as profit. But protecting the company data isn’t the sole responsibility of its IT department. Every employee should be responsible for keeping all the confidential company information secure, which is why cybersecurity awareness training is essential. So what topics should good cybersecurity awareness training include? When hosting […]


Read more

How To DR Test Successfully


On a scale of 1-10, how prepared is your company for an insider sabotage attack, ransomware-virus, or a natural calamity? Research has shown that 94% of companies that suffered from a catastrophic data loss do not survive, with almost half never reopening after an incident. A disaster recovery (DR) plan can help your organization prepare […]


Read more

How A BYOD Policy Might Be Putting Your Company’s Network At Risk


Bring Your Own Device (BYOD) is a relatively new policy used by some organizations that allow their employees to use personal devices for business use. While this practice originally began with smartphones, the BYOD movement has since extended to laptops and tablets. So in what ways would a BYOD policy put your network at risk? […]


Read more