Summary of Key Points Legal organizations store and handle large volumes of sensitive client data, making them particularly likely to be targeted by cybercriminals. Legal firms and other...
Business Posts
Cybercrime’s Evolution Since the 80’s: Historical Facts and Figures
Summary of Key Points Experts agree that “cybercrime” as we understand it today originated in the 1980s. Cybercrime has caused nearly $6 trillion in damages since the 1980s, and that figure is...
Top 5 Cyber Attacks on Retail Businesses
Summary of Key Points Nearly half of all data breach incidents target retailers, and nearly 20% of customers say they’ll stop shopping at companies that let themselves get hacked—which makes...
Hack the Chat
Last updated August 19, 2022 Summary: By the end of 2022, 70% of white collar workers will interact with chatbots on a daily basis—but chatbots can pose a cybersecurity risk if they are not properly...
Subscription Model Software: Pros and Cons
Last updated August 19, 2022 Summary: Subscription-based cloud and managed IT and security services help SMBs eliminate the up-front costs of setting up their own in-house systems.Managing IT and...
Phishing Attacks are Evolving: What You Need to Know to Keep Your Company Safe
Last updated August 19, 2022 Summary: Phishing is a form of social engineering where the attacker impersonates a trusted party for the purpose of gaining access to sensitive information like login...
GoDaddy: Have You Been Impacted and What to Do Next?
Last updated August 19, 2022 Summary: In 2021, GoDaddy’s Managed WordPress hosting environment was accessed by an unauthorized third party using a compromised password.The hack accessed the personal...
The Growing Trend of “Hacktivism”, & What it Means for Businesses
Last updated August 19, 2022 Summary: “Hacktivism” occurs when activists digitally disrupt the systems or operations of a given organization—often to further political goals rather than specifically...
What is Cybersecurity Insurance (& Does Your Business Need It?)
Last updated September 27, 2022 Summary: In 2020, there was one ransomware victim every 10 seconds—and the average cost of a data breach that year was $3.86 million.Organizations in every industry...
Making Sense of TTPs, Cybersecurity, & What That Means for Your Business
Last updated August 19, 2022 Summary: TTPs are tactics, tools, & procedures that threat actors to orchestrate cyber attacks.Analyzing TTPs helps organizations identify who is responsible for...
Creating an Agile Workplace: How to Prepare for the Unexpected
COVID-19 has fundamentally changed the way many companies conduct business, and not all organizations have handled the jarring transition to remote work smoothly. Daily operations and working...
How the Financial Industry Can Strengthen Their Cybersecurity
Last updated September 27, 2022 Summary: 35% of all data breaches target financial institutions. These hacks can do more than steal money—they can also access huge amounts of customer data,...
Cybersecurity for the Manufacturing Industry, What You Need to Know Now
Last updated August 19, 2022 Summary: When it comes to cyber attacks, the manufacturing industry is the second most targeted industry in the United States. Cyber criminals tend to target smaller...
The Costs & Infrastructure Tied to a Remote Workforce
COVID-19 & the Sudden Shift to Remote Work As COVID-19 forces employees to practice social distancing, or even to self-isolate or shelter in place, the ability for employees to work remotely has...
Cloud Isn't the "Future"; It's the Now
Technology is continually changing and evolving, creating new and innovative ways to conduct business. While many of us may still think the cloud is some futuristic concept, in reality, it’s already...
Hacked? Here's What to Know (& What to Do Next)
Last updated September 27, 2022 Summary: You can’t guarantee a breach will never happen at your organization, but you can reduce the likelihood and mitigate the damage a breach can potentially...
Operational Technology vs. Information Technology: Differences, Similarities, & How They Intermix With Industrial Control Systems
Last updated August 18, 2022 Summary: Operational Technology (OT) controls the physical functions for organizations, while Information Technology (IT) controls their data. IT can be used to make OT...
Why Your Company Could be the Next Equifax or CapitalOne
Last updated September 27, 2022 Summary: The Equifax breach in 2017 and the CapitalOne breach in 2019 were disruptive, high-profile cyber attacks on major businesses. However, organizations of every...
The Capital One Hack: The Latest in a Series of High-Profile Breaches
Last updated September 27, 2022 Summary: The CapitalOne hack occurred in late March 2019 but took months to discover. In that time, 140,000 social security numbers, 1 million Canadian social...
What Kind of Relationship Should You Have With Your MSSP?
Last updated September 27, 2022 Summary: MSSP stands for managed security services provider. These third-party organizations provide ongoing IT and cybersecurity services for organizations.Many...
Latest Posts

Cybersecurity & the Legal Industry: What You Need to Know (& Protect)
Technology has become a fact of life in the business world, and the legal industry is no exception. Here’s what you need to know about legal cybersecurity.

Cyber Warfare: How the Rules of Conduct Are Changing
Safeguarding your organization’s digital assets used to feel simple. However, with the internet now crucial to many business functions, it’s become a necessity.

Social Engineering 101 (& How to Protect Your Data)
How vulnerable are you and your organization to social engineering attacks? The answer might surprise you. Let the experienced cybersecurity professionals at VirtualArmour give you an overview of how modern social engineering works and show you steps you can take to protect yourself from its potentially disastrous effects.