Last updated August 19, 2022 Summary: “Hacktivism” occurs when activists digitally disrupt the systems or operations of a given organization—often to further political goals rather than specifically...
Cybersecurity Posts
What is Cybersecurity Insurance (& Does Your Business Need It?)
Last updated September 27, 2022 Summary: In 2020, there was one ransomware victim every 10 seconds—and the average cost of a data breach that year was $3.86 million.Organizations in every industry...
Guide to Creating an Effective Incident Response Plan
Last updated August 19, 2022 Summary: Incident Response Plans (IRPs) are instructions that tell your team how to detect, respond to, and recover from cybersecurity threats.Strong IRPs have 5 steps:...
The Risks of Public WiFi (& How to Protect Yourself)
Last updated August 19, 2022 Summary: Public WiFi is inherently risky because it can be accessed by anyone (including threat actors)Common Public WiFi cyberattacks include man-in-the-middle (MitM)...
Everything You Need to Know About WiFi 802.11ax (AKA WiFi 6)
Last updated August 19, 2022 Summary: Since 2020, the FCC has expanded access for unlicensed traffic to the broadband spectrum. This access to better, faster WiFi is called WiFi 802.11ax or “WiFi...
Identifying a Breach: Finding Indicators of Compromise (IOC)
Last updated August 19, 2022 Summary: Cybersecurity breaches like malware, phishing, and DDoS attacks) can cost organizations millions and damage their reputation beyond repair.In addition to having...
Making Sense of TTPs, Cybersecurity, & What That Means for Your Business
Last updated August 19, 2022 Summary: TTPs are tactics, tools, & procedures that threat actors to orchestrate cyber attacks.Analyzing TTPs helps organizations identify who is responsible for...
Deleting Yourself From Social Media: A Brief Guide to Getting Out
Last updated August 19, 2022 Summary: Cyber attacks using social media platforms are becoming more common and more sophisticated—in addition to spreading malware and conducting phishing attacks,...
Is it Possible to Still Browse Anonymously?
Last updated August 19, 2022 Summary: Many internet users use the terms “privacy” and “anonymity” interchangeably, but these are not the same. While steps can be taken to make your internet activity...
Terms & Phrases Used in the Managed IT & Cybersecurity Industries
Last updated September 27, 2022 Summary: Not everyone knows what a managed IT provider does—or how to define cybersecurity. Learning some technical terms used in the industry can help you understand...
How Apple’s Stance on Privacy May Impact Device Security in the Near Future
In recent months, Apple has taken steps to improve user security and privacy. In February 2020, Apple announced that they had joined the FIDO (Fast Identity Online) Alliance. The Alliance's goal is...
The Shift From Cybersecurity Being a Want to a Need Just Happened
The SolarWinds attack has shaken the technology and cybersecurity spheres to their core, compromising the security of both private businesses and the US government alike. This wide-reaching attack...
The SMBs Guide to Getting Started With Cybersecurity
Last updated September 27, 2022 Summary: Two thirds of the world’s SMBs had experienced a cyberattack as of 2019, but only 45% considered their cybersecurity posture ineffective.Common cybersecurity...
The Digital Partridges in the Cybercrime Pear Tree
The holidays may be a time for spending time with loved ones and exchanging gifts, but the gifts cybercriminals bring aren’t jolly at all. 2020 Has been a rough year, and many organizations have...
Identity Management is Really Just Cybersecurity Best Practices With a Fancy (& Expensive) Name
Last updated August 19, 2022 Summary: Identity and Access Management (IAM) strategies define and manage the roles and access privileges for a network’s users.Under an IAM strategy, individuals often...
In a Remote World, Social Engineering is Even More Dangerous
Remote work has changed how many of us conduct our day to day work tasks and brought with it new cybersecurity dangers. Though social engineering has been around for decades, the shift to remote...
The Modern Hacker: Who They Are, Where They Live, & What They're After
Last updated August 19, 2022 Summary: Modern hackers have become more professional and organized, turning hacking into a multi-billion dollar growth business. An increasing amount of hacking is...
Hackers Are Increasingly Targeting People Through Their Phones
Last updated September 27, 2022 Summary: Hackers target phones for several reasons: to steal money and financial data, eavesdrop on phone calls, blackmail users with stolen personal information,...
Leveraging Your MSSP in an "IT Light" Environment
Not every organization can afford to support a full team of IT experts, but that doesn’t mean you can’t benefit from expert knowledge and advice. By leveraging your Managed Security Services...
Cybersecurity Basics Every College & University Needs to Have in Place
Last updated September 27, 2022 Summary: Approximately 13% of all post-secondary institutions have been targeted by ransomware attacks.Establishing consistent cybersecurity protocols for these...
Latest Posts
What Are Endpoints (& How Does Endpoint Security Work)?
Your network’s endpoints allow authorized users to access the data they need—but they can also be exploited by malicious actors if they’re not properly protected. Learn more about what endpoints are and how to protect them here so you can keep your digital assets safe.
Explaining Open XDR: How It Works & Where It Fits
Open XDR integrates with your tools from other vendors to unify your cybersecurity stack—learn more about how it works and where it should fit in your organization’s IT strategy here.
Cybercrime’s Evolution Since the 80’s: Historical Facts and Figures
Cybercrime has changed a lot over the past 20 years. Learn more about its history, including the way costs and responses have evolved.