The Equifax Hack: What We Learned & What You Can Do

Posted by Shruthika Kamat April 22nd, 2020. at 7:08 am

Earlier this month, consumer credit rating company Equifax notified consumers of a major theft of personally identifiable information (PII). The Equifax breach affected nearly 143 million Americans making Equifax the target of much scrutiny as analysts question their web application security. What...

Read More

Tags: Tags: , , , , , , , ,

DRaaS and What Really Happens

Posted by Rachel Tse August 3rd, 2018. at 7:08 am

Disaster Recovery is essential during this time of the year. Unfortunately, hurricane season is already here and preparing for it is important. For businesses, DRaaS may be a solution that you have heard of, but what is really going on...

Read More

Tags: Tags: , , ,

The Cloud and Different Types of Clouds Explained…

Posted by Rachel Tse July 29th, 2018. at 7:08 am

Cloud has been around, but what really is it and why should I use it? You've probably heard of the term "the cloud" thrown around like it is something that's been around for a while, but what does it really...

Read More

Tags: Tags: , , ,

3 Innovations That Tackle The Password

Posted by Rachel Tse July 27th, 2018. at 7:08 am

Without a doubt, passwords are one of the main challenges of day to day life. There is a constant struggle between wanting to keep your information secure, but also creating a password that is easy to remember among the hundreds...

Read More

Tags: Tags: , , ,

“…As A Service” Infographic

Posted by Rachel Tse July 20th, 2018. at 7:08 am

What does "...as a Service" mean and whats it got to do with cloud computing? Cloud Computing Last time, we talked about the basics of cloud computing. To recap, basically cloud computing allows you to access software and other resources that...

Read More

Tags: Tags: , ,

5 Signs You’re Being Phished (with Examples)

Posted by Rachel Tse July 13th, 2018. at 7:08 am

If you're not familiar with the term phishing, you might be more familiar with the Nigerian Prince Phishing email back in 2016 and its alleged perpetrator's arrest last year. Though it's dubbed "the butt of late night jokes" by the FTC, phishing in...

Read More

Tags: Tags: , , ,

How to Stop Worrying About Small Business Cybersecurity Challenges

Posted by Shruthika Kamat June 15th, 2018. at 7:08 am

Are you concerned about cyber-attacks threatening your small business? You are not alone. According to a recent National Small Business Association (NSBA) survey, 94% of small business owners are concerned their businesses will be the target of a cyber-attack. Their...

Read More

Tags: Tags: , , , , , , , , ,

Chrome 68 Update Could Mark Your Site As “Not Secure”

Posted by Shruthika Kamat June 8th, 2018. at 7:08 am

Chrome 68 is set to come out starting July 2018 and could have serious implications for businesses still running their sites on HTTP. This includes not only losing site traffic, but also driving away customers and prospects. The solution to preventing...

Read More

Tags: Tags: , , , ,

A 3 Point Approach to Security Automation

Posted by Shruthika Kamat September 1st, 2017. at 7:08 am

The recent WannaCry ransomware worm hit an estimated 74 countries worldwide and affected more than 550,000 total computers – 60,000 in just its first day. And now Petya is following in Wannacry’s footsteps, exploiting the same Windows vulnerability to get...

Read More

Tags: Tags: , , , ,

The Best Way to Beat a Hacker is to Think Like One

Posted by Shruthika Kamat August 22nd, 2017. at 7:08 am

In today’s threat environment, focusing on prevention alone is no longer a sufficient strategy. In 2016, there were 40% more reported incidents of data breaches compared to 2015. Experts anticipate that the number of incidents will increase further in 2017....

Read More

Tags: Tags: , , , , , , ,