Password Autofill Has its Dangers

Password Autofill Has its Dangers

Modern web browsers and password managers come with a feature called password autofill. This feature allows users to store and automatically use their account credentials to access websites and other applications. While this seems to make users’ online world easier,...
Top Cyber Security Terms to Know That Could Protect Your Business

Top Cyber Security Terms to Know That Could Protect Your Business

Scary stories of cyberattacks against large corporations, small businesses and individuals regularly appear in our daily news cycle. Even if you don’t know a whole lot about computers and the internet, chances are you’ve heard a lot of cyber security...
Don’t Let MFA Fatigue Get You Compromised

Don’t Let MFA Fatigue Get You Compromised

As with most IT Managed Service Providers and network administrators, we recommend users to use multi-factor authentication (MFA) for all their important accounts (i.e., Office 365, VPN, bank accounts, and pretty much everything in between).   MFA is usually done in...
Educating Employees Prevents Phishing

Educating Employees Prevents Phishing

It can happen to anyone, at any company and at any time, a phishing scam. Even when utilizing all the advanced security protocols that we advise our clients to use, and still a phishing email gets through.    The employee receives an email appearing to come from their...
Why Vulnerability Assessments Are Important

Why Vulnerability Assessments Are Important

Protecting your IT infrastructure and business data against a potential breach is vital for your business. You can’t stop what you don’t know is coming but you can identify and evaluate the gravity of weaknesses in your company’s IT infrastructure.  How does a...
Insuring Cybersecurity Risk Grows in the Business World

Insuring Cybersecurity Risk Grows in the Business World

Businesses are becoming more aware of the risk to its infrastructure with cyber attacks.  Like any other type of risk, insurance is available to mitigate the financial burden that could come from an attack.   Because the extent and variety of cybersecurity risk that...