In 2018, 71% of all targeted attacks started with a spear phishing attempt. Spear phishing is a long-used, targeted scam where attackers will research habits, trusted organizations, fellow employees and any other personal information to create an email you are more likely to interact with. A successful phishing attack can lead to ransomware, CEO fraud and even total business compromise. But even the oldest trick in the book can be prevented with proactive security & training.
Read MoreCloud services have become the next step for those looking for a solution to support their whole infrastructures, without sacrificing speed or space. Read 5 reasons you should move to the cloud today here. The need for comprehensive security in the cloud environment is critical for those who want to ensure their infrastructure against malware and theft. But as with all growing technology, new vulnerabilities are constantly being found and exploited. As more and more businesses turn to cloud applications to support their infrastructure, keeping proactive security strategies will become more important than ever.
Read MoreWhat once was something that only very large, fortune 500 companies did, now has become a very widely used strategy for the expansion and increased efficiency of small to medium sized businesses everywhere. Chances are that you’ve heard the phase “we’re moving to the cloud” but what does that even mean? And why should you do it too?
Read MoreIt’s never too early to start planning for a disaster. In fact, a good disaster preparedness plan should be reviewed and updated continuously, not just in the aftermath of an event. When Irma hit the Florida coast last September, we had our plans. Because of them, we ultimately made it through with little non-repairable damage. That being said, there is always room for improvement and we’ve learned some things that are commonly overlooked when planning that could’ve made a big difference in the time it took to recover from Irma.
Read MoreNo business can operate successfully without some policies in place. The purpose of given policies can vary from keeping consistency and accountability for certain actions or jobs, setting expectations of how and when an action should be completed and distributing knowledge consistently among a team or organization. Just like any other part of your business where policies are implemented, technology and security are no different. Often we see evidence that either policies are not being enforced or don’t exist at all. Having good policies in place can mean the difference between a business recovering after an event or attack or not at all.
Read MoreJust when we all thought that the fallout from the exposure of Spectre and Meltdown earlier this year was almost over, the release of another, related flaw proves just how fundamentally damaging and widespread these types of vulnerabilities are. This newest flaw may prove to be even more far reaching than Spectre and Meltdown, with the ability to affect virtual machines and bypass Intel’s internal software security feature, something that has previous stopped other flaws from being exploited.
Read More