Our Blog

June 27, 2022

Using Cryptocurrency for Your Business

Cryptocurrency has been around since 2009, but it’s only now becoming accepted as a payment method on a large scale. Over 4,000 cryptocurrencies existed as of […]
June 23, 2022

Cybercriminals Are Using a New Tool to Carry Out BEC Scams

The FBI recently issued an alert about a new tool that cybercriminals are using in business email compromise (BEC) scams. Find out what this new tool […]
June 21, 2022

Ukraine Invasion Threatens US Cybersecurity

Hacking groups throughout the world are increasing their activities as a result of the Russian invasion of Ukraine on February 24, 2022. Some of these groups […]
June 16, 2022

Cryptbot Targeting all Chrome Browsers

Security researchers from Ahn Lab report they have observed a new version of CryptBot, which is a malware for Windows systems with Chrome browsers that steals […]
June 15, 2022

The most common cybersecurity threats businesses face today

Are you vulnerable to one of these common cyberattacks? If so, it's time to call CHIPS.
June 13, 2022

3 Troubling Trends in Data Compromise Attacks

As part of its mission to help educate businesses about identity crimes, the Identity Theft Resource Center has released its annual data breach report. Learn about […]
June 7, 2022

Key challenges all cybersecurity professionals face

Cybersecurity professionals face a number of challenges as they try to keep internal data safe. In our latest blog post, we take a closer look at some of these challenges.
May 24, 2022

How to ensure your employees don’t become hacking victims

One of the first steps in securing your internal network is to ensure your employees buy into your security methods. Our latest blog post tells you how to do just that.
May 17, 2022

How insecure APIs are a threat to your network security

Modern data exists in the cloud. From Amazon AWS to Microsoft Azure, IBM, Google Cloud and more — the days of onsite hardware are long gone. But new threats arise in the age of the cloud? One such threat is an insecure API. Learn how to prevent it in our latest blog post: