Cybersecurity & IT Insights

Best Line of Defense Against Business Email Compromises

The Cost of Business Email Compromise In May of 2022, the FBI published a report stating that Business Email Compromises account for over $43 Billion in losses Internationally.  In the “2022 State of Email Security Report” from Mimecast, a polling of 1400...

read more

Managed IT Service Provider: A Buyers Guide

If you’re considering a new Managed IT Service Provider (MSP) for your business, you probably know how difficult it is to assess them objectively.  Many MSPs tout objective measures like Average Response Time and Mean Time to Resolve. These are important measures, but...

read more

3 Big Cybersecurity Risks

As a business leader, it's challenging to distinguish between significant security threats and those that are less likely to affect your organization. This is especially true nowadays, with frequent reminders about cybersecurity's importance. While we emphasize...

read more

What Is a Perimeter Defense?  How to Layer Security

The explosion of ransomware has many security experts arguing forcefully against a perimeter-only security model.  These experts point out that this approach has led to cyberattacks that have caused billions of dollars of economic damage.  But what is perimeter...

read more

Double Extortion Attacks More Prevalent than Ever

Ransomware is still all over the place - attacks are up 62% globally and 158% in North America since 2019.  But ransomware-only attacks have mostly been replaced by more sophisticated – and ruthless – attacks. In a traditional ransomware attack, a cyber criminal finds...

read more
Ransomware News: Biggest Attack Ever

Ransomware News: Biggest Attack Ever

Ransomware News: Early July had several cybersecurity events with big impacts on small and mid-sized businesses. Here are three you that should know about. REvil’s Kaseya Attack Hits Thousands of Businesses Worldwide, US Will Respond The biggest news story this week...

read more

7 Types of Malware

The ever-changing IT environment has made it easier for malware to exist and thrive. In today's world, businesses and individuals alike are constantly bombarded with new threats, making it more important than ever to be aware of the latest malware trends. Types Of...

read more