Category: Uncategorized

biggest data breaches of 2019 illustrated by a red padlock fthat is open in a group of blue padlocks that are locked

The Biggest Data Breaches of 2019 – 3 Lessons to Learn

by Kevin Lancaster

Learn 3 valuable lessons from the biggest data breaches of 2019, and how you can stay off that list in 2020.

Read More
webinars to grow your MSP business represented by a green tree flourishing in a field by an id agent logo

3 Free Webinars to Grow Your MSP Business Now

by ID Agent

Get a jump on the competition and get ready for your next chapter with these 3 new webinars to grow your MSP business featuring insider tips from experts and influencers.

Read More
Cybercriminals sell research data on the dark web is represented by a man in a cartoon burlar outfir running away from another man with a stolen folder

Smart Cybercriminals Sell Research Data on the Dark Web

by Kevin Lancaster

Passwords aren't the only thing cybercriminals are stealing to sell - cybercriminals also sell research data on the Dark Web, especially in healthcare. See how to foil their plans.

Read More
a laptop computer featuring a warning symbol on the screen is ahown against a bright blue background to symbolize a ransomware attack

Ransomware is on the Rise – How to Bolster Your Defenses

by Kevin Lancaster

Ransomware was a 2019 staple, and it's bigger than ever in 2020. Our security training and awareness tips can help you defend against ransomware.

Read More
a lab flask filled with orange liquid has a burglar face in it on a blue background representing hackers trying to steal data from drugmaker Gilead

Hackers Go Phishing at Gilead With New Bait

by Kevin Lancaster

Pharmaceutical giant Gilead has been the target of several strong phishing attacks using new types of bait. It's a great lesson in why maintaining awareness of new vectors of potential threats is an important part of a continued defense against phishing.

Read More
numbers and colored bars evoke an information stream while a person watches from the shadows to represent malicious insiders stealing compny data to sell on the Dark Web

Is Your Staff Moonlighting on the Dark Web?

by Kevin Lancaster

Malicious insiders are a bigger security threat than anonymous hackers. Your staff could be selling you out by selling access to sensitive systems and more on the Dark Web. Here's how to stop it.

Read More
A sleek mobile phone is shown next to a white login screen on a blue background

5 Fail-safe Tips for Choosing the Right IAM Platform

by Kevin Lancaster

Password protection just doesn't cut it anymore. You need something better - an IAM, like Passly. But how can you choose the right IAM for your company? Our expert advice can guide your decision.

Read More
a woman sits at her desk working on a computer while someone observes her through binoculars

Is Your Biggest Threat Already Inside Your Building? Our Top Tips for Combating Insider Threats

by Kevin Lancaster

While the evil hacker causing all of the problems is a popular cybersecurity villain, it isn't the whole story. Insider threats are an even bigger problem, and facing them head on with smart solutions is the best cure.

Read More

3 Ways for Healthcare Orgs to Combat COVID-19 Cyberattacks

by Kevin Lancaster

New information from CISA and NCSC details how healthcare organizations are under attack by cybercriminals looking to profit from COVID-19 data. These tips can help stop them.

Read More
a red triangle warning icon with an exclamation point insise is superimposed over a blue login screen

GoDaddy Breach Highlights the Importance of Credential Security

by Kevin Lancaster

The newest breach at security-challenged GoDaddy is a reminder that credential security doesn't just affect your business - it impacts your partners and clients too. Strengthen your business relationships by showing that you take it seriously in a few simple but significant ways.

Read More