3 Steps to Secure Email

3 Steps to Secure Email

Email, the great security hole of all IT. We need it, most of our users (if not all) have access. It remains a top threat vector for the bad actors. Think about it, many ransomware attacks start with an email. Whaling and spear phishing, email, compromised...
4 Cybersecurity Budget Focus Areas for Higher Education in 2020

4 Cybersecurity Budget Focus Areas for Higher Education in 2020

Chief information security officers are grappling with a variety of issues as they try to keep their campuses safe from cyber criminals. In fact, the No. 1 issue for higher ed IT leaders this year is information security, according to EDUCAUSE, a nonprofit association...
The Accidental Insider Threat – A clear and present risk

The Accidental Insider Threat – A clear and present risk

Media images depict the unknown ‘hooded’ bad actor in the dark room with many computer screens and we often forget about one the biggest risks organizations face – the insider. The insider can be broken into two categories, 1) the accidental insider who is duped...
Data theft by employee leads to federal indictment

Data theft by employee leads to federal indictment

Many businesses focus so much on protecting their data from outside threats that they give little thought to inside threats – namely their own staff.  For a manufacturer in Chicago, that turned out to be a very costly mistake! The company hired an engineer in...
What is proactive incident response?

What is proactive incident response?

Incident response as a term is reactive, so it’s no wonder that a proactive approach to incident response is a foreign concept to many clients and resellers that we work with.  Let’s look at a few common scenarios to understand why proactive incident...