Skip to content
Free illustrations of Hacker

The Biggest Vulnerabilities that Hackers are Feasting on Right Now

Software vulnerabilities are an unfortunate part of working with technology. A developer puts out a software release with millions of lines of code. Then, hackers look for loopholes that allow them to breach a system through that code. The developer issues a patch to fix the vulnerability. But it’s not long before a new feature updateRead More »The Biggest Vulnerabilities that Hackers are Feasting on Right Now

person in black long sleeve shirt using macbook pro

Small Businesses Are Attacked by Hackers 3x More than Larger Ones

Have you felt more secure from cyberattacks because you have a smaller business? Maybe you thought that you couldn’t possibly have anything that a hacker could want? Didn’t think they even knew about your small business. Well, a new report by cybersecurity firm Barracuda Networks debunks this myth. Their report analyzed millions of emails across thousandsRead More »Small Businesses Are Attacked by Hackers 3x More than Larger Ones

MacBook Pro on table beside white iMac and Magic Mouse

5 Mistakes Companies Are Making in the Digital Workplace

The pandemic has been a reality that companies around the world have shared. It required major changes in how they operate. No longer, did the status quo of having everyone work in the office make sense for everyone. Many organizations had to quickly evolve to working through remote means. During the worst of the pandemic, it’sRead More »5 Mistakes Companies Are Making in the Digital Workplace

FTC Gramm-Leach-Bliley Act (GLBA)

  • Cy-Quest 

The Safeguards Rule affects any company or entity that offers or supports financial services, for example, dealerships and other similar industries that collect customer financial data. The new guidelines were published on December 9, 2021, giving those impacted by the changes a year to comply with the new standards and objectives. Starting December 9, 2022, amendmentsRead More »FTC Gramm-Leach-Bliley Act (GLBA)

6 Discontinued Technology Tools You Should Not Be Using Any Longer

  • Cy-Quest 

One constant about technology is that it changes rapidly. Tools that were once staples, like Internet Explorer and Adobe Flash, age out. New tools replace those that are obsolete.  Discontinued technology can leave computers and networks vulnerable to attacks. While older technology may still run fine on your systems that doesn’t mean that it’s okay toRead More »6 Discontinued Technology Tools You Should Not Be Using Any Longer

Free illustrations of Phishing

You Need to Watch Out for Reply-Chain Phishing Attacks

Phishing. It seems you can’t read an article on cybersecurity without it coming up. That’s because phishing is still the number one delivery vehicle for cyberattacks. A cybercriminal may want to steal employee login credentials. Or wish to launch a ransomware attack for a payout. Or possibly plant spyware to steal sensitive info. Sending a phishingRead More »You Need to Watch Out for Reply-Chain Phishing Attacks

Free illustrations of Cybersecurity

What Should You Do to Reduce Risk When Your Mobile Device Goes Missing?

Few things invoke instant panic like a missing smartphone or laptop. These devices hold a good part of our lives. This includes files, personal financials, apps, passwords, pictures, videos, and so much more. The information they hold is more personal than even that which is in your wallet. It’s because of all your digital footprints. ThisRead More »What Should You Do to Reduce Risk When Your Mobile Device Goes Missing?