Tag: cybersecurity

Google Fights Back in Phishing Explosion & So Should You

by Kevin Lancaster

Phishing attacks have exploded in the wake of COVID-19, and it only seems to be getting worse. These tools can help SMBs be ready to defend against the onslaught.

Read More
a gold pocket watch is depicted on a one dollar bill

Solutions for 3 Urgent CISO Priorities

by Kevin Lancaster

Welcome to the new remote-work world. CISOs may have accounted for upgrades and increases in cyberattacks in their 2020 planning, but no one accounted for COVID-19. Here are 3 urgent priorities that CISOs must address in the wake of COVID-19 and fast solutions to get them checked off your list.

Read More
A woman sits at a desk with a computer and a man sits at another desk with a computer. An arrow travels between both desks with a red skull in the middle to indicate danger.

The Week in Breach: 04/15/20 – 04/21/20

by Kevin Lancaster

This week, compromised email accounts expose sensitive data, ransomware disrupts remote work, and the FBI warns healthcare providers and labs to watch out for COVID-19 related cybercrime.

Read More
A baby blue background features a sleek laptop with a bright pink pop up box springing out of it with asterisks and a lock to indicate a secure login.

Boost Remote Security and Ease Everyone’s Stress With This Tool

by Kevin Lancaster

More technology brings more tools for work and entertainment - and more logins to remember. Everyone has too many these days, causing endless trouble for both users and techs. This phenomenon leads to endemic password reuse, weak passwords, and password mishandling. How can SMBs solve this problem? By making logins a one-stop-shop.

Read More
A worker sits at a sleek desk wearing a suit jacket and tie on top and flip flops and flowered shorts on the bottom with an adorable orange cat under the desk, animation-style.

Cyberattacks Double as Remote Work Creates Unexpected Vulnerabilities

by Kevin Lancaster

New ways to work bring new cybersecurity challenges - and new opportunities for cybercriminals. Cyberattacks have doubled since January 2020, and phishing attacks have skyrocketed. Here are 3 safety steps that SMBs can take today to defend against this surge in attacks.

Read More
A dark-haired caucasian woman smiles while typing on her silver laptop computer at a sleek desk with a green wall and window behind her.

Remote Work Vulnerabilities and How to Address Them

by Kevin Lancaster

Remote workers are getting things done, but they're also creating some unexpected cybersecurity risks to their companies systems and data. Here are some actionable steps to help mitigate those risks before you have a data breach.

Read More
A blue globe with a dark blue arrow appears on a computer monitor.

Stolen Account Info Zooms to Dark Web for 500K+ Zoom Users

by Kevin Lancaster

Zoom meetings have become the way we do business right now, but they aren't as safe as you might think. A batch of stolen credentials recently discovered on the Dark Web plus unexpected vulnerabilities means that every company needs to be alert to the dangers of virtual meetings.

Read More

Passly Packs 7 Essential Features to Secure a Remote Workforce

by Kevin Lancaster

Today's worker can stay connected to the systems and data that they need to work efficiently anytime from anywhere. Remote work isn't just convenient for companies - it's also convenient for cybercriminals. Take a look at 7 features of Passly that can quickly mitigate that threat.

Read More
a hand holding a piece of papaer that says phishing scam on it is pictured passing the paper to someone with a handful of cash.

FBI Warns Against COVID-19 Business Fund Transfer Phishing Scams

by Kevin Lancaster

A new FBI warning outlines a special kind of phishing scam targeting c-suite and accounts payable staff - proving that phishing training is necessary at every level.

Read More

Malware-Laden COVID-19 Emails Exploit MS Office Vulnerability

by Kevin Lancaster

The Secret Service warns that clever new phishing attacks simulating official emails, files, and links are being perpetrated by cybercriminals looking to take advantage of the anxiety created by COVID-19 and exploit an old MS Office vulnerability.

Read More