2022's best place for Cybersecurity Insights and Advice for Everyone

CyberSecurity – SMB

7 ways to secure your home office

7 ways to secure your home office

People working from home perform most of their tasks online. They are now more exposed to cyber attacks than ever before. Cyber criminals see a great opportunity in the massive growth in working from home and the vulnerabilities of home office security.

What is a Computer Virus?

What is a Computer Virus?

What's a computer virus? We hear about it all the time but do you really know what it is and how to prevent one?

What to Do if You’ve Fallen Victim to a Phishing Attack

What to Do if You’ve Fallen Victim to a Phishing Attack

Cybercriminals target phishing scam attempts on fatigued workers in the hopes of catching them off guard with an attention-getting email. They also launch phishing schemes against unsuspecting individual users by using fear and intimidation. And it sometimes works.

5 Biggest Cybersecurity Mistake SMBs do

5 Biggest Cybersecurity Mistake SMBs do

Small and midsize companies can’t afford to learn cybersecurity haphazardly while cyberattacks are steadily rising. If you’re a decision-maker, you can’t ignore the 424% increase in cyber breaches in 2021. 

What is Business Email Compromise (BEC)

What is Business Email Compromise (BEC)

Business email compromise is one of the most financially destructive cyber crimes. These are emails that appear to be sent by known or trusted sources asking for something legitimate.

A 10 Step Plan for Small Business Cyber Security

A 10 Step Plan for Small Business Cyber Security

An effective cyber security plan outlines in simple language the best cybersecurity practices your organization needs to stay safe. It doesn't have to be complicated, but it should be pragmatic.

Why every small and medium business needs a cybersecurity strategy

Why every small and medium business needs a cybersecurity strategy

A truck full of security studies show nearly every small businesses has exposed data and poor cybersecurity policies. Either build and execute a cybersecurity strategy or expect to be a victim of cyber crime. Be prepared, be proactive, and be safe.

How to Build a Cyber Security Awareness Program for Your SMB Business

How to Build a Cyber Security Awareness Program for Your SMB Business

Building a cyber security awareness culture should be a top priority for your organization. Every manager, department, and individual in your firm must commit to this on a long-term basis.

Is Cyber Security Awareness Training Critical for SMBs?

Is Cyber Security Awareness Training Critical for SMBs?

You might think that cyber security awareness training is not for small businesses. You might also think that the bad guys are more interested in bigger companies. You probably should read this because you would be wrong on both counts. 

What is a certificate authority CA and what do they do?

What is a certificate authority CA and what do they do?

Certificate authorities are the guardians of digital identity. They come in both public and private capacities. Certificates issued by them are trusted because information are validated from the requester’s own records and/or from third party sources. 

What is HTTPS?

What is HTTPS?

HTTPs enables web servers and web browsers to establish secure connections. It encrypts data being transmitted in both directions. This helps prevent thieves from stealing  sensitive information along the way.

What is a Rogue Certificate?

What is a Rogue Certificate?

A rogue certificate is a valid certificate issued by a legitimate certificate authority. However, it’s untrustworthy because either it was compromised or was issued to the wrong party.

10 Cybersecurity Trends for Small Businesses in 2022

10 Cybersecurity Trends for Small Businesses in 2022

Knowing the latest cybersecurity trends spells the difference between keeping your business safe and opening it up to cyber attackers.

Is a Cybersecurity Risk Assessment Worth the Money?

Is a Cybersecurity Risk Assessment Worth the Money?

A cybersecurity risk assessment does more than just identify and analyze threats. It counteracts threats and keeps your IT systems safe.

Strong Passwords. One giant step to protect our digital lives

Strong Passwords. One giant step to protect our digital lives

Here's how to create long, complex, and unique passwords to protect your accounts and keep your sensitive info safe from hackers.

Lock the Door. Bad Passwords: The Greatest Threats to Password Security

Lock the Door. Bad Passwords: The Greatest Threats to Password Security

Bad passwords are the entry way for hackers to get into your accounts. Learn how to protect your cyber assets by using better passwords now.

SMBs 7 Deadly Cybersecurity Sins

SMBs 7 Deadly Cybersecurity Sins

How many of these seven deadly cybersecurity sins are you guilty of? Build a resilient cybersecurity strategy before it’s too late. 

What is a Rootkit?

What is a Rootkit?

Rootkits are nearly invisible and a dangerous type of malware that allows hackers access to computers without the knowledge of the owners. It is designed in such a way that it can remain in a network or on a computer system undetected for an extended period of time.

10 Cyber Security Stats Every Small Business Needs to Know

10 Cyber Security Stats Every Small Business Needs to Know

Knowing the right cyber security stats helps your business fight off and recover from cyber attacks. Get informed.

The #1 Cyber Threat Small Businesses are Facing

The #1 Cyber Threat Small Businesses are Facing

Phishing attacks are the most widespread and most damaging threat to small businesses, accounting for 90% of all cyber security breaches.

What is a Botnet and How to Protect Your Business from One?

What is a Botnet and How to Protect Your Business from One?

A botnet is a network of computers that work as a collective to infiltrate your device. Here's how to protect your business from botnets.

Do You need to Conduct a Cyber Security Risk Assessment

Do You need to Conduct a Cyber Security Risk Assessment

Small businesses experience cyber security risks in varying forms and sophistication every day. Being complacent about the risks and ignoring the importance of a cybersecurity risk assessment can damage the health of their businesses. 

What is Spear Phishing?

What is Spear Phishing?

Spear phishing is a targeted cyberattack to steal your information. You should be aware of the dangers of this and how to address them.

What is Whaling?

What is Whaling?

Whale phishing is a targeted spear-phishing attack in which cybercriminals impersonate the high-level executives of an organization to send messages to lower-level company administrators in a position to do the acts being requested by the criminals on two things they want most -- money and data.

What is a Keylogger?

What is a Keylogger?

Keylogger is a digital surveillance tool. They can track every click, touch, key stroke, download and conversation carried out on the device they are installed on

What is Shoulder Surfing?

What is Shoulder Surfing?

Shoulder surfing is a form of social engineering that enables cybercriminals to gather information just by looking over their victims’ shoulders. The aim of shoulder surfing is to obtain personal data, such as usernames, passwords or personal identification numbers (PINs), bank account numbers or credit card numbers.

What is a Trojan Horse?

What is a Trojan Horse?

Trojan horse computer viruses are malware disguised as or hidden in legitimate software. Hidden from view and ready to attack.

What is a Website Security Certificate?

What is a Website Security Certificate?

A website security certificate is a digital certificate that asserts the identity of a website. It’s a virtual file approved by an industry-trusted third-party called a certificate authority (CA)

What is Hacking?

What is Hacking?

Hacking is an old game in the cyberworld with ever changing players and techniques. It may be done with good intentions or malicious motives. It is growing rapidly because of the proliferation of devices.

What is a Hacker?

What is a Hacker?

A hacker is a computer expert. They come in multiple colors and can have positive and negative agendas. They are often called black hat or white hat hackers.