Blog
Blog

Cybersecurity Threat Intelligence – Should I have one?

Cybersecurity threat intelligence services are comprehensive offerings that collect, analyze, and provide real-time insights on potential cybersecurity threats, vulnerabilities, and risks to your organization. These services monitor diverse data sources, detect threats, and identify vulnerabilities, including malware…

Blog

Tabletop Exercises – How to conduct a cybersecurity preparedness exercise

Tabletop Exercises – How to conduct a cybersecurity preparedness exercise

We all know that Cybersecurity is paramount to ensuring the continuous operation of any business in today’s digital world, and responding to any type of cybersecurity incident at some point is only question of when. To safeguard your…

Blog

Denial of Service Attacks

A Denial of Service (DoS) attack is a type of cyber-attack that attempts to make a website, online service or computer network unavailable by overwhelming it with a flood of traffic or requests, causing it to crash or become extremely slow and unresponsive.. It can be targeted at a single system or an entire network,…

Blog

Bring Your Own Device Policies – What do you need to have?

Bring Your Own Device, or BYOD, has become an important technology topic over the past ten years as mobile devices have increased their capability and sophistication.  But how should your company deal with employees using their personal devices for work?  What company services do you allow employees to connect…

Blog

Business E-mail Compromise: What it is and how to avoid it

Business email compromise (BEC) is a type of online scam where a cybercriminal tricks a company or its employees into transferring money or sensitive information to the fraudster's account.

The scam typically starts with an email that looks like it is from a trusted source, such as a colleague, supplier,…

Blog

A Great Time to Catch up on Patches

Recently there have been a number of critical and zero-day vulnerabilities that have been announced in the news across several platforms.  Microsoft announced a patch to a remote code execution vulnerability within internet explorer that achieved a CVSS rating of 8.8 which is significant.  There was also…

Blog

Do I Need An Incident Management Process?

Does your organization have a defined incident management or problem management process?  If not, it may be a good idea to spend some time formally defining your incident management process and plan for how your technology and cybersecurity teams respond to incidents.  Having even a simple incident management…

Blog

[Attention IT Departments] Federal Cybersecurity Advisory Issued

The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Health and Human Services (HHS) released a joint cybersecurity advisory regarding cyber threats from ransomware. The advisory includes actions to take today to mitigate these threats. We…

Blog

Geofencing - what is it and why should you consider using it?

A geofence is a type of virtual perimeter for a real-world geographic area.  Geofencing has many uses that can vary widely, from smart devices and appliances to marketing / audience engagement to security and human resources. 

The most popular use-case is as more of a security mechanism, such as…

Blog

PACK EXPO International Cybersecurity Briefing

Heading to PACK EXPO International in a few weeks?  You’ll want to keep the following in mind to ensure a safe and secure experience while at the show.

Wireless Connectivity

A guest wireless network will be available for you to use while you are on-site at McCormick Place.  The network…