New Phishing Threat Presents Security Challenge

Phishing Attacks Target OAuth Credentials to Gain System Access Discover how an increasingly popular authentication process, OAuth, can be exploited b

keep Reading

What Are the Most Serious Cybersecurity Stories of 2019?

We’re only halfway into 2019, yet data protection specialists and IT analysts have already seen an unfortunate spike in criminal activity across in

keep Reading

Mac Operating Systems Vulnerable to New Security Exploit

A recently discovered security vulnerability could leave Mac users exposed to malware disguising itself in other programs. If your business relies o

keep Reading

Acquiring A New Business? Check Their Cybersecurity Posture

Buying a company is no small undertaking, even if the company is considered “small” by industry standards. Due diligence is a huge part of the pr

keep Reading

Why Security Awareness Training Makes Sense for Your Small Business

Your small business needs a cybersecurity strategy, but beyond that, it also needs security awareness training. These two areas are not one and the s

keep Reading

The #1 Security Threat to Local Small Businesses

There are many types of risk in business: the risk that a new competitor will come on the market and steal market share, the risk that top staff memb

keep Reading

What Are Tracking Cookies? Are They Bad?

For today’s tech blog we’ll tackle a topic that’s become much more visible over the last couple years. What are tracking cookies? How do they g

keep Reading

5 Crucial Elements to Training Your Employees in Optimal Cyber Security

Cyber attackers are highly motivated to obtain or corrupt your company’s data. But whether their motivation is to steal your funds outright, hold y

keep Reading

5 Crucial Elements to Training Your Employees in Optimal Cyber Security

Cyber attackers are highly motivated to obtain or corrupt your company’s data. But whether their motivation is to steal your funds outright, hold y

keep Reading

Essential List of Cybersecurity Terms to Know in 2019

As the digital community continues to expand to include more individuals and more devices, enforcing cybersecurity becomes more complicated. The numb

keep Reading