Last updated August 19, 2022 Summary: Many internet users use the terms “privacy” and “anonymity” interchangeably, but these are not the same. While steps can be taken to make your internet activity...
Risk Mitigation & Prevention Posts
What Are the Risks of Using Unsupported Hardware?
Last updated September 27, 2022 Summary: Holding off on replacing your hardware until it breaks can seem like an easy way to save money, but old hardware comes with numerous drawbacks.Old hardware...
Terms & Phrases Used in the Managed IT & Cybersecurity Industries
Last updated September 27, 2022 Summary: Not everyone knows what a managed IT provider does—or how to define cybersecurity. Learning some technical terms used in the industry can help you understand...
Identity Management is Really Just Cybersecurity Best Practices With a Fancy (& Expensive) Name
Last updated August 19, 2022 Summary: Identity and Access Management (IAM) strategies define and manage the roles and access privileges for a network’s users.Under an IAM strategy, individuals often...
Hackers Are Increasingly Targeting People Through Their Phones
Last updated September 27, 2022 Summary: Hackers target phones for several reasons: to steal money and financial data, eavesdrop on phone calls, blackmail users with stolen personal information,...
Proximity Tracing & You: What to Expect as the World Returns to Work
COVID-19 has had a profound effect on our society, affecting our health, our work, and our overall well-being. Proximity tracing aims to help track the spread of this virus and use this information...
Cybersecurity Basics Every College & University Needs to Have in Place
Last updated September 27, 2022 Summary: Approximately 13% of all post-secondary institutions have been targeted by ransomware attacks.Establishing consistent cybersecurity protocols for these...
The Ultimate Guide to Cybersecurity in the Healthcare Industry
Last updated September 27, 2022 Summary: Cyberattacks that target organizations in the healthcare industry often have consequences beyond financial losses.Interruptions to operations and access to...
How the Financial Industry Can Strengthen Their Cybersecurity
Last updated September 27, 2022 Summary: 35% of all data breaches target financial institutions. These hacks can do more than steal money—they can also access huge amounts of customer data,...
Cybersecurity for the Manufacturing Industry, What You Need to Know Now
Last updated August 19, 2022 Summary: When it comes to cyber attacks, the manufacturing industry is the second most targeted industry in the United States. Cyber criminals tend to target smaller...
How Fear Motivates People to Click on Spam
Last updated September 27, 2022 Summary: Fear is a powerful motivator—and spam, which make up over 85% of all email, takes advantage of this fear to scam people or invade their privacy via...
COVID-19 Demonstrates the Power of Remote Workplaces (But Those Are Not Without Risks)
COVID-19 is changing the way society handles a lot of things, including how we work. As companies rapidly shift to remote workplaces, we can expect there to be a few hiccups along the way. In...
Cyber Hygiene 101: Basic Steps to Keep Your Company Secure
Cybercriminals are increasingly targeting small and medium-sized businesses, at least in part because the little guys are less likely to have robust cybersecurity defenses in place, and don’t...
What is Information Security (& How Does it Impact Your Business?)
The internet has revolutionized how we do business, but it has also changed how business owners need to approach security. Cybercrime remains a serious threat, but there are steps organizations can...
5 Old-School Hack Techniques That Still Work (& How to Protect Your Data)
Last updated September 27, 2022 Summary: Hacking is actually much older than the internet. The earliest examples date back to the 1950s, when mimicking the dial tone of phones to make free...
Hacked? Here's What to Know (& What to Do Next)
Last updated September 27, 2022 Summary: You can’t guarantee a breach will never happen at your organization, but you can reduce the likelihood and mitigate the damage a breach can potentially...
Why Your Company Could be the Next Equifax or CapitalOne
Last updated September 27, 2022 Summary: The Equifax breach in 2017 and the CapitalOne breach in 2019 were disruptive, high-profile cyber attacks on major businesses. However, organizations of every...
Airports are a Hackers Best Friend (& Other Ways Users Expose Themselves to Risk)
Traveling is stressful, even when things go smoothly. Your routine is disrupted, you are in an unfamiliar place, and there is a good chance you are not as well-rested as usual. This can make you...
Cybersecurity Spring Cleaning: It’s Time to Review Your Security Practices
When most people think of spring cleaning, they think of giving their house a thorough cleaning and donating unwanted items to charity. But spring is also a great time to review your organization’s...
Beyond SIEM: Why Your Security Posture Needs to SOAR
Last updated August 19, 2022 Summary: SIEM stands for Security Information and Event Management—there are two kinds of SIEM system: unmanaged and managed.Unmanaged SIEM systems are often only...
Latest Posts

What Are Endpoints (& How Does Endpoint Security Work)?
Your network’s endpoints allow authorized users to access the data they need—but they can also be exploited by malicious actors if they’re not properly protected. Learn more about what endpoints are and how to protect them here so you can keep your digital assets safe.

Explaining Open XDR: How It Works & Where It Fits
Open XDR integrates with your tools from other vendors to unify your cybersecurity stack—learn more about how it works and where it should fit in your organization’s IT strategy here.

Cybercrime’s Evolution Since the 80’s: Historical Facts and Figures
Cybercrime has changed a lot over the past 20 years. Learn more about its history, including the way costs and responses have evolved.