3 Steps to Secure Email

3 Steps to Secure Email

Email, the great security hole of all IT. We need it, most of our users (if not all) have access. It remains a top threat vector for the bad actors. Think about it, many ransomware attacks start with an email. Whaling and spear phishing, email, compromised...
4 Cybersecurity Budget Focus Areas for Higher Education in 2020

4 Cybersecurity Budget Focus Areas for Higher Education in 2020

Chief information security officers are grappling with a variety of issues as they try to keep their campuses safe from cyber criminals. In fact, the No. 1 issue for higher ed IT leaders this year is information security, according to EDUCAUSE, a nonprofit association...
Report on Ransomware Q4 2019

Report on Ransomware Q4 2019

A look at the recently released cybercrime report by Malwarebytes that focuses on ransomware has some interesting takeaways: First the United States is the target 53% of the time. Canada came in second at a distant 10%.The top 5 states targeted were in order: Texas,...
Ransomware Risk Assessment

Ransomware Risk Assessment

Ransomware attacks are spreading and ransom demands are growing.  22 cities across Texas were recently held hostage for millions after their networks were infiltrated and data was encrypted, and that’s just the latest in a string of cities and businesses being...
What is Credential Stuffing?

What is Credential Stuffing?

Credential stuffing has been in the news because it is a method of attempting to take over accounts of a company by using the databases of known breaches to ‘stuff’ thousands or millions of known credentials into an automated bot and attempting to see if they can get...