Insider Threats Are Getting More Dangerous! Here’s How to Stop Them

One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection. Because insiders have authorized system access, they bypass certain security defenses. Such as those designed […]

How Often Do You Need to Train Employees on Cybersecurity Awareness?

You’ve completed your annual phishing training. This includes teaching employees how to spot phishing emails. You’re feeling good about it. That is until about 5-6 months later. Your company suffers a costly ransomware infection due to a click on a phishing link. You wonder why you seem to need to train on the same information […]

Are Two Monitors Really More Productive Than One?

https://www.pexels.com/photo/silver-imac-on-top-of-brown-wooden-table-326502/ When you see those people with two monitors, you may assume they do some specialized work that requires all that screen space, or they just really like technology. But having the additional display real estate that a second screen provides can benefit anyone, even if you’re doing accounting or document work all day. We […]

U.S. cyber officials are blaming hackers tied to the Chinese government for one of the largest cyberattacks in U.S. history

The FBI and NSA have “high confidence” that hackers contracted by China’s Ministry of State Security carried out the cyberattack on the Microsoft Exchange email server this spring, a breach that exposed tens of thousands of private and public U.S. entities.  Officials say the attack was just one example of Chinese hacker’s use of “ransomware” to threaten […]