Last updated August 19, 2022 Summary: Many internet users use the terms “privacy” and “anonymity” interchangeably, but these are not the same. While steps can be taken to make your internet activity...
Risk Mitigation & Prevention Posts
Terms & Phrases Used in the Managed IT & Cybersecurity Industries
Last updated September 27, 2022 Summary: Not everyone knows what a managed IT provider does—or how to define cybersecurity. Learning some technical terms used in the industry can help you understand...
Identity Management is Really Just Cybersecurity Best Practices With a Fancy (& Expensive) Name
Last updated August 19, 2022 Summary: Identity and Access Management (IAM) strategies define and manage the roles and access privileges for a network’s users.Under an IAM strategy, individuals often...
Hackers Are Increasingly Targeting People Through Their Phones
Last updated September 27, 2022 Summary: Hackers target phones for several reasons: to steal money and financial data, eavesdrop on phone calls, blackmail users with stolen personal information,...
Cybersecurity Basics Every College & University Needs to Have in Place
Last updated September 27, 2022 Summary: Approximately 13% of all post-secondary institutions have been targeted by ransomware attacks.Establishing consistent cybersecurity protocols for these...
How Fear Motivates People to Click on Spam
Last updated September 27, 2022 Summary: Fear is a powerful motivator—and spam, which make up over 85% of all email, takes advantage of this fear to scam people or invade their privacy via...
COVID-19 Demonstrates the Power of Remote Workplaces (But Those Are Not Without Risks)
COVID-19 is changing the way society handles a lot of things, including how we work. As companies rapidly shift to remote workplaces, we can expect there to be a few hiccups along the way. In...
What is Information Security (& How Does it Impact Your Business?)
The internet has revolutionized how we do business, but it has also changed how business owners need to approach security. Cybercrime remains a serious threat, but there are steps organizations can...
5 Old-School Hack Techniques That Still Work (& How to Protect Your Data)
Last updated September 27, 2022 Summary: Hacking is actually much older than the internet. The earliest examples date back to the 1950s, when mimicking the dial tone of phones to make free...
Hacked? Here's What to Know (& What to Do Next)
Last updated September 27, 2022 Summary: You can’t guarantee a breach will never happen at your organization, but you can reduce the likelihood and mitigate the damage a breach can potentially...
Airports are a Hackers Best Friend (& Other Ways Users Expose Themselves to Risk)
Traveling is stressful, even when things go smoothly. Your routine is disrupted, you are in an unfamiliar place, and there is a good chance you are not as well-rested as usual. This can make you...
Beyond SIEM: Why Your Security Posture Needs to SOAR
Last updated August 19, 2022 Summary: SIEM stands for Security Information and Event Management—there are two kinds of SIEM system: unmanaged and managed.Unmanaged SIEM systems are often only...
Social Engineering 101 (& How to Protect Your Data)
Summary of Key Points Social engineering differs from other cybersecurity threats by targeting people instead of directly attacking digital assets. Common social engineering tactics include baiting,...
The Risks of Public WiFi (& How to Protect Yourself)
Last updated August 19, 2022 Summary: Public WiFi is inherently risky because it can be accessed by anyone (including threat actors) Common Public WiFi cyberattacks include man-in-the-middle (MitM)...
Why is WiFi 6’s Uptake so Slow? A Look at the Current Technological Environment
Last updated August 19, 2022 Summary: Many organizations have been slow to adopt WiFi 6—due to the upgrade costs, a limited number of clients, and a fear of the bugs and issues early adopters of new...
Deleting Yourself From Social Media: A Brief Guide to Getting Out
Last updated August 19, 2022 Summary: Cyber attacks using social media platforms are becoming more common and more sophisticated—in addition to spreading malware and conducting phishing attacks,...
What Are the Risks of Using Unsupported Hardware?
Last updated September 27, 2022 Summary: Holding off on replacing your hardware until it breaks can seem like an easy way to save money, but old hardware comes with numerous drawbacks.Old hardware...
Cyber Hygiene 101: Basic Steps to Keep Your Company Secure
Cybercriminals are increasingly targeting small and medium-sized businesses, at least in part because the little guys are less likely to have robust cybersecurity defenses in place, and don’t...
Cybersecurity Spring Cleaning: It’s Time to Review Your Security Practices
When most people think of spring cleaning, they think of giving their house a thorough cleaning and donating unwanted items to charity. But spring is also a great time to review your organization’s...
19 Essential Cybersecurity Best Practices
Every company, no matter how large or small, should have a robust cybersecurity strategy in place to protect their company’s digital assets. Staying secure in the digital era is no longer and set...
Latest Posts

What is SD-WAN? A Comprehensive Guide to Software-Defined Networking
Securely connecting employees with the branch offices, data centers, and web applications that drive our businesses is a necessary step for doing business in today’s environment. We are increasingly distributing our networks across the globe, and the data our users...

Fortinet NGFWs: What is a Next-Generation Firewall?
Firewalls have been a mainstay in the world of cybersecurity for the past few decades, and for good reason. They monitor and control network traffic based on predetermined security rules, acting as a barrier between internal and external networks. Over this time, they...

Managed Infrastructure Services – What Are They?
Proper management of our IT infrastructure components is a necessary organizational defense tactic for doing business in the twenty first century. Most of our networks have moved online, and vast swaths of our workforce have moved remote, meaning hackers and other bad...