Blog
What’s Changing in the Cybersecurity Insurance Market?
Cybersecurity insurance is still a pretty new concept for many SMBs. It was initially introduced in the 1990s to provide coverage for large enterprises. It covered things like data processing errors and online media. Here are some of the cyber liability insurance trends you need to know about.
5 Ways to Balance User Productivity with Solid Authentication Protocols
One constant struggle in offices is the balance between productivity and security. If you give users too much freedom in your network, risk increases. But add too many security gates, and productivity can dwindle. There are ways to have both secure and productive users. It simply takes adopting some solutions that can help. These are tools that improve authentication security. But do it in a way that keeps user convenience in mind.
What to Include in a Year-end Technology Infrastructure Review
When the year is coming to a close, it’s the perfect time to plan for the future. Most businesses begin the year with the hope of growing and improving operations. Much of how a business operates depends on technology. So, it makes sense to look to your IT for areas of optimization. This year-end, take some time to do a technology review with your IT team or managed IT provider. This will set you up for success and security in the coming year.
What Are the Advantages of Implementing Conditional Access?
It seems that nearly as long as passwords have been around, they’ve been a major source of security concern. Eighty-one percent of security incidents happen due to stolen or weak passwords. Additionally, employees continue to neglect the basics of good cyber hygiene. Below, we’ll explain what conditional access is. As well as how it works with multi-factor authentication (MFA). We’ll also review the advantages of moving to a conditional access process.
Simple Guide to Follow for Better Endpoint Protection
Endpoints make up much of a company’s network and IT infrastructure. This is a collection of computers, mobile devices, servers, and smart gadgets. As well as other IoT devices that all connect to the company network. In this guide, we’ll provide you with straightforward solutions. Solutions focused on protection of endpoint devices.
Insider Threats Are Getting More Dangerous! Here’s How to Stop Them
One of the most difficult types of attacks to detect are those performed by insiders. An “insider” would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection. It’s important for companies to understand what makes up an insider threat. That’s the first step towards mitigation.
9 Urgent Security Tips for Online Holiday Shopping
The holiday shopping season is taking off. This means that scammers have also revved up their engines. They’re primed and ready to take advantage of all those online transactions. Here are some of the most critical safety tips to improve your online holiday shopping.
Business Email Compromise Jumped 81% Last Year! Learn How to Fight It
In recent years, electronic mail (email for short) has become an essential part of our daily lives. Many people use it for various purposes, including business transactions. With the increasing dependence on digital technology, cybercrime has grown. A significant cyber threat facing businesses today is Business Email Compromise (BEC).
5 Things You Should Never Do on a Work Computer
In a survey of over 900 employees, it was found that only 30% said they never used their work PC for personal activities. The other 70% admitted to using their work computer for various personal reasons.
Some of the non-work-related things that people do on a work computer include:
About the Presenter
Steve is the Owner and CTO for Custom Internet Services. He has over 20 years of experience in Information Technology and taught IT for 13 years at the college level. He holds several IT certifications from Microsoft and CompTIA and has served as a reviewer or technical editor for several Microsoft certification course books. His cybersecurity experience includes holding several Global Information Assurance Certifications (GSEC, GCIA, GCIH, GCFA, GWEB, GICSP) as well as the NSTISSI 4011 sponsored by the Committee on National Security Systems.
Register for Our Next Webinar!
We all like saving money, don’t we? So, when we’re faced with the choice of using a free or really inexpensive email provider versus a more expensive option, the temptation […]