Category: Passly

Don’t Put Off Cybersecurity Incident Response Planning

by Amelia Paro

There's no time to waste in a cybersecurity disaster. How do you plan to respond to an incident, and what do you do next? Find out now!

Read More
business email compromise represented by a Pop Art style black and white image of a man in a suit with binary code in place of a face

Business Email Compromise is on the Rise Again

by Matt Solomon

Business email compromise danger is rising in every sector, and attacks are more expensive than ever. Here's how to fight back.

Read More
improve password security by not using passwords on post it notes, like this picture.

42% of Companies Must Improve Password Security. Here’s How to Do It.

by Amelia Paro

If you think you don't have a password security problem, you're wrong. Read these scary statistics and weep - then do something about it.

Read More

These Bad Passwords Make Every Day Groundhog Day for IT Teams

by ID Agent

Every day is Groundhog Day for IT Teams when people use or recycle these bad passwords, but they just keep doing it. Here's how to stop that.

Read More
security access control represented by a man in a suit touching a lock symbol on a floating screen

Less Than 25% of Firms Have Solid Security Access Control

by Jeremy Malin

Bad security access control makes securing data harder for businesses & opens opportunities for MSPs. Here's how to take advantage of that.

Read More
IoT cybersecurity risk

Is Biden’s Peloton Bike an IoT Cybersecurity Risk?

by Jeremy Malin

President Biden may be bringing an IoT cybersecurity risk to the White House: his Peloton bike. Here's how to handle similar threats.

Read More
How are cybercriminals stealing business data? Does put your business at risk? Here's how it happens & how to mitigate the risk affordably.

How Are Cybercriminals Stealing Business Data?

by Matt Solomon

How are cybercriminals stealing business data? Very easily using tools like ransomware. Does that put your business at risk? Yes. Here's how to mitigate it quickly and affordably.

Read More
protect data from cyberattacks wth secure identity and access management illustrated by a series of cartoon clouds with locks

Protect Data from Cyberattacks with 1 Multifunctional Weapon

by Jeremy Malin

What if you could protect data from cyberattacks with just one affordable multifunctional security tool? You can - and here's how to do it.

Read More
facts about cybersecurity in 2020 and looking ahead to 2021 represented by an electronic eye on a blue background with computer code.

3 Big Facts About Cybersecurity in 2020 to Remember for 2021

by Matt Solomon

As you're making your 2021 cybersecurity plan, don't forget to consider these 3 essential facts about cybersecurity in 2020.

Read More
improve password security with these 3 tools. Image shows a white password login box on a blue screen

Improve Password Security in 3 Steps

by Jeremy Malin

Improve password security with these 3 tools to help you spot bad passwords, make good ones & keep cybercriminals out of your business!

Read More