Our Blog

March 3, 2022

Log4J Bug Leaves Horizon Servers Vulnerable

The Cybersecurity and Infrastructure Security Agency (CISA) and its partners are responding to the widespread exploitation of a critical remote code execution (RCE) vulnerability in Apache’s […]
March 1, 2022

Five common cyber security myths

Ready to separate fact from fiction? Here are five of the most common cybersecurity myths.
February 28, 2022

Cybergang Mailing Malicious USB Flash Drives to Companies

Cybercriminals have been sending USB flash drives laced with ransomware to US businesses. Find out how this attack works and what to do about it. If […]
February 24, 2022

Data Privacy Laws you Need to be Aware of

Almost every country on Earth has passed data privacy laws regulating the collection of personal information, the ways subjects are informed of collection activities and the […]
February 22, 2022

Be on the lookout for appjacking

Appjacking is a common way that cybercriminals can cause malicious intent to your systems. Find out how it takes place and how your may be vulnerable to it.
February 21, 2022

3 Ways Windows 11 Will Make It Harder for Hackers to Attack Your Company’s Computers

The rollout of Windows 11 is well underway. Here are three ways Windows 11 is helping companies keep malware at bay. The rollout of Windows 11 […]
February 17, 2022

Keep Abreast of States’ Data Privacy Laws

Several states will start enforcing their data privacy laws in 2023. Find out which states and why your business needs to know about those laws. Following […]
February 15, 2022

What is advanced threat protection, and do you need it?

Have you heard of advanced threat protection and do you need it? If're a business holding critical and secure information, then advanced threat protection is something you need to know about.
February 15, 2022

What is the human cost of ransomware?

How seriously do you take the threat of ransomware attacks? Your cybersecurity is at stake. But are you behaving as though you know it to be true?