Why Business Email Compromise is the Cyber Criminal’s Most Devastating Weapon
You’ve probably heard stories like this one before: A person in a business is supposed to send a wire transfer to another business. They receive an email at the last minute, often with a panicked tone, making an urgent request – their primary bank account is...
The Best Multi-Factor Authentication Setup to Immediately Improve Your Security [Podcast]
Proving who you are is the primary goal of most cybersecurity systems. The best way to accomplish that task is through Multi-Factor Authentication. The primary purpose of cybersecurity systems is to protect data from those who are not authorized to get it. Therefore,...
The Best Cloud Backup for Small Business in 2023
In today's digital age, small businesses rely on data to run their operations and make critical business and operational decisions. But with so much data being stored on a company’s computers, servers, and other devices, it's important to have a plan in place to...
Encryption 101: 4 Useful Concepts You Need to Know [Podcast]
4 Basic Concepts. 15 minutes. That’s it. That's all the time you need to understand how encryption works in the modern ecosystem. It's an important tool for protecting data, it's required by countless laws, regulations, rules, and contracts. But do you really know how...
What is Zero Trust Cybersecurity and How Much Does it Cost? [Podcast]
Zero Trust is one of the most popular phrases thrown about by cybersecurity professionals and - more importantly - thrown into cybersecurity sales pitches these days. It's obviously important, and it's obviously something you want. But what is it? Is it really...
Why Cyber Resilience is the Best Metric for Cybersecurity [Podcast]
There are a lot of ways to measure the impact - and relative success - of a cybersecurity program. There are tests you can run to determine how effectively your employees are adopting defenses to phishing emails. There are table-top exercises to determine your ability...
What is a DDoS Cyberattack? [Podcast]
The best way to make sure that you and your business are protected from cyberattacks is to employ a broad-focus cybersecurity strategy. In order to do so, you need to have a basic understanding of the threats your business faces from cybercriminals, hacktivists, and...
How Implementing Least Privilege will Protect Your Business [Podcast]
The more access users have to your company's data, the more vulnerable that data is in the event of a data breach. A malicious actor gaining access to one of your employee's credentials gives them access to everything that employee is allowed to see. That's why you...
Disaster Recovery: Forming Your Disaster Response Team
If it seems like each step in preparing your Disaster Recovery Plan is the most important step, even more important than the one that came before it, I can’t blame you. That said, we’ve come to another really important step – creating your Disaster Response Team (the...
8 Lessons from the Uber Hack [Podcast]
So, right from the start, let's clarify - this is about the Uber hack that occurred (or was discovered/publicized) in September of 2022. In fact, it was a rather unique breach of an oft-breached company. The hacker who breached Uber appears to have used very basic...