Last updated August 19, 2022 Summary: In 2021, GoDaddy’s Managed WordPress hosting environment was accessed by an unauthorized third party using a compromised password.The hack accessed the personal...
Cybersecurity Posts
What Your Vulnerability Scan Report is Telling You (& What It’s Not)
Last updated August 18, 2022 Summary: Vulnerability scans provide visibility of your cybersecurity posture’s weaknesses before cybercriminals can exploit them. They look for weak points in your...
The Growing Trend of “Hacktivism”, & What it Means for Businesses
Last updated August 19, 2022 Summary: “Hacktivism” occurs when activists digitally disrupt the systems or operations of a given organization—often to further political goals rather than specifically...
Guide to Creating an Effective Incident Response Plan
Last updated August 19, 2022 Summary: Incident Response Plans (IRPs) are instructions that tell your team how to detect, respond to, and recover from cybersecurity threats.Strong IRPs have 5 steps:...
Identifying a Breach: Finding Indicators of Compromise (IOC)
Last updated August 19, 2022 Summary: Cybersecurity breaches like malware, phishing, and DDoS attacks) can cost organizations millions and damage their reputation beyond repair.In addition to having...
Is it Possible to Still Browse Anonymously?
Last updated August 19, 2022 Summary: Many internet users use the terms “privacy” and “anonymity” interchangeably, but these are not the same. While steps can be taken to make your internet activity...
Terms & Phrases Used in the Managed IT & Cybersecurity Industries
Last updated September 27, 2022 Summary: Not everyone knows what a managed IT provider does—or how to define cybersecurity. Learning some technical terms used in the industry can help you understand...
The Digital Partridges in the Cybercrime Pear Tree
The holidays may be a time for spending time with loved ones and exchanging gifts, but the gifts cybercriminals bring aren’t jolly at all. 2020 Has been a rough year, and many organizations have...
Identity Management is Really Just Cybersecurity Best Practices With a Fancy (& Expensive) Name
Last updated August 19, 2022 Summary: Identity and Access Management (IAM) strategies define and manage the roles and access privileges for a network’s users.Under an IAM strategy, individuals often...
Hackers Are Increasingly Targeting People Through Their Phones
Last updated September 27, 2022 Summary: Hackers target phones for several reasons: to steal money and financial data, eavesdrop on phone calls, blackmail users with stolen personal information,...
Cybersecurity Basics Every College & University Needs to Have in Place
Last updated September 27, 2022 Summary: Approximately 13% of all post-secondary institutions have been targeted by ransomware attacks.Establishing consistent cybersecurity protocols for these...
How Fear Motivates People to Click on Spam
Last updated September 27, 2022 Summary: Fear is a powerful motivator—and spam, which make up over 85% of all email, takes advantage of this fear to scam people or invade their privacy via...
COVID-19 Demonstrates the Power of Remote Workplaces (But Those Are Not Without Risks)
COVID-19 is changing the way society handles a lot of things, including how we work. As companies rapidly shift to remote workplaces, we can expect there to be a few hiccups along the way. In...
What is Information Security (& How Does it Impact Your Business?)
The internet has revolutionized how we do business, but it has also changed how business owners need to approach security. Cybercrime remains a serious threat, but there are steps organizations can...
5 Old-School Hack Techniques That Still Work (& How to Protect Your Data)
Last updated September 27, 2022 Summary: Hacking is actually much older than the internet. The earliest examples date back to the 1950s, when mimicking the dial tone of phones to make free...
Hacked? Here's What to Know (& What to Do Next)
Last updated September 27, 2022 Summary: You can’t guarantee a breach will never happen at your organization, but you can reduce the likelihood and mitigate the damage a breach can potentially...
Operational Technology vs. Information Technology: Differences, Similarities, & How They Intermix With Industrial Control Systems
Last updated August 18, 2022 Summary: Operational Technology (OT) controls the physical functions for organizations, while Information Technology (IT) controls their data. IT can be used to make OT...
The Rising Cost of Health Care Industry Data Breaches
The 2019 edition of the Cost of a Data Breach Report, sponsored by IBM and published by Ponemonis causing quite a stir in the cybersecurity world. The annual report, which draws its data from...
Airports are a Hackers Best Friend (& Other Ways Users Expose Themselves to Risk)
Traveling is stressful, even when things go smoothly. Your routine is disrupted, you are in an unfamiliar place, and there is a good chance you are not as well-rested as usual. This can make you...
What Kind of Relationship Should You Have With Your MSSP?
Last updated September 27, 2022 Summary: MSSP stands for managed security services provider. These third-party organizations provide ongoing IT and cybersecurity services for organizations.Many...
Latest Posts

What is SD-WAN? A Comprehensive Guide to Software-Defined Networking
Securely connecting employees with the branch offices, data centers, and web applications that drive our businesses is a necessary step for doing business in today’s environment. We are increasingly distributing our networks across the globe, and the data our users...

Fortinet NGFWs: What is a Next-Generation Firewall?
Firewalls have been a mainstay in the world of cybersecurity for the past few decades, and for good reason. They monitor and control network traffic based on predetermined security rules, acting as a barrier between internal and external networks. Over this time, they...

Managed Infrastructure Services – What Are They?
Proper management of our IT infrastructure components is a necessary organizational defense tactic for doing business in the twenty first century. Most of our networks have moved online, and vast swaths of our workforce have moved remote, meaning hackers and other bad...