News & Events

What are you doing to protect your company against phishing attacks?

What is phishing?

Back in the early days of the internet, Nigerian princes would descend from their throne and send email offers of untold riches, only if you supplied your bank information to them. Of course, it was a scam and most people have since learned to ignore and move on. On the other hand, hackers have also gotten smarter, using more sophisticated methods to attempt to get your information, commonly known today as phishing.

Share this post

World Backup Day is March 31: Have You Taken the Pledge?

When was the last time you backed up your computer files? If the answer is more than a couple days (or you can’t even recall the last time), you are at risk of losing more than you may expect. Hard drive failure or data corruption can cause more than a headache—it can mean the end of your business, the loss of the next Great American Novel, or the deletion of irreplaceable photos. Making an exact copy of your files and data, known as a backup, is so critical for everyone that there’s even an international awareness day on the topic, World Backup Day.

wannacry security attack

WannaCry IT Security Protection Case Study: What You Should Know

The far-reaching WannaCry ransomware attack made international headlines last year when unidentified hackers encrypted the data of more than 200,000 computers in over 150 countries between May 12–14, 2017. Large corporations or tech giants weren’t the only ones targeted. The attack affected an assortment of entities, from financial institutions and hospitals to banks and individuals. Although it only lasted a couple of days, the effects were long lasting—and so were the lessons learned.

Share this post

Cybersecurity 101: Protecting the Medical Practice in an Evolving Threat Landscape

Today, it’s not just large corporations (and infamous breach victims) like Target and Sony who are at risk of breaches or cyber attacks; it’s everyone. The perpetrators aren’t so much setting their sights on one company and trying to get in as they are automating their systems to find and exploit vulnerabilities and execute phishing schemes. What’s so scary is that small practices and organizations now also find themselves in the crosshairs.

Share this post