Securing Cyber Monday

Securing Cyber Monday

With the holiday season in full effect and Cyber Monday sales on pace to hit £7.8 billion by the end of the day, it’s best practice to make sure you’re not falling victim to another breach. As hackers refine their attacks in time for the biggest online shopping season...
Wireless Best Practice for SMBs

Wireless Best Practice for SMBs

Chances are, your business runs with wireless internet capabilities. Small business owners have a lot on their minds, unfortunately network security isn’t always on the top of the list. An unsecured wireless network, as trivial as it may seem, can be costly to a...
IT Compliance vs IT Security

IT Compliance vs IT Security

For some businesses, the line between compliance and security becomes easily obscured and may seem like a moving target. How do we create extensive security programs while meeting compliance obligations? This week will go over the differences between security and...
Don’t let your business fall behind!

Don’t let your business fall behind!

Businesses face risk every day. It’s a part of getting business done, especially in our digital world. Managing risk is critical, and that process starts with a risk assessment. In this week’s newsletter we will discuss the importance of having a dedicated team to...
Don’t let your business fall behind…

Don’t let your business fall behind…

Businesses face risk every day. It’s a part of getting business done, especially in our digital world. Managing risk is critical, and that process starts with a risk assessment. In this week’s newsletter we will discuss the importance of having a dedicated team to...
Back to Basics: 2-Factor Authentication

Back to Basics: 2-Factor Authentication

So… why aren’t passwords good enough? Let’s go ahead and consider why it’s important to do everything you can about online security. Malicious attacks against individuals as well as governments and companies are more and more common. With so much of our lives...