When you make a phone call, do you really know who's on the other end of the line? Here's what to look for when identifying callback scams.
A new ransomware group is targeting US businesses. Are you protected if your organization is next?
Corey Ainscough Director, Information Security Cyber attacks now seem to be an inevitable part of everyday life, and cybercriminals are making large profits by taking advantage of businesses with limited security controls. According to the FBI’s 2019 Internet Crime Report, $3.5 billion was lost last year due to these cyberattacks against small businesses in the...
Jeff Gorman President Everyone has items in their personal life of great value. The intrinsic value is not based on what these things could be sold for, the value is because the items are of personal significance and can not be replaced. The same is true for your business; you have critical data and systems...
Most small and midsize business (SMB) owners exist in a bubble of blissful ignorance. They focus on the day-to-day operations of their organization, driving growth, facilitating hiring and guiding marketing, without a single thought given to the security of the computer networks these processes depend on. After all, they’re just the little guy – why...
Brad Mathis – [Senior Consultant – Information Security] Imagine the following scenario. You are going through your daily routine and you receive an urgent email from the CEO. The email is urgent, appears to be time sensitive, and is requiring you to act immediately. You are aware the CEO is currently out on vacation or away on...