5 Holiday Cyber Security Tips to Keep Your Information Secure This Season

There is a certain amount of accepted risk associated with shopping, especially during the holiday season.  Identify theft and fraud have become an accepted risk for many online and retail shoppers.  This year is thought to see an even greater level of attacks aimed toward the consumer market, ranging from malicious sites exploiting your data…

Read More

Fraud Detection: Identifying Tech Support Scams

We’ve all received unsolicited calls before, most offering complimentary services or attempting to sell a product.  However, a growing trend in gaining access to an otherwise secure network involves deceiving a caller into divulging pertinent information, or worse, control of their computer to install malware. How It Works:  This alternate approach with initiating a hack by…

Read More

DDOS Mitigation Strategies: Lessons From a Recent DDOS Attack

Last month, huge parts of our internet essentially shut down; from Amazon, Twitter, and Spotify, to Netflix and Reddit.  One of the biggest takeaways from the attack is the realization of just how susceptible our fragile internet truly is.  The graph below shows just how quickly and to what extent the United States’ internet was…

Read More

Everything You Need to Know About Network Vulnerability Assessments

It may come as of little surprise that security breaches hurt small business much more than larger corporations. According to the National Cybersecurity Alliance, more than 70% of attacks target small businesses.  It is also estimated that 60% of hacked small businesses experience devastating economic hardship, leading many to suffer a complete loss, closing their…

Read More

What is The Difference Between an Information Technology Audit and a Technology Assessment?

The term Information Technology (IT) Assessment is often convoluted because it is so often portrayed as the simple and easy process of scanning an organization’s existing network.  However, this could not be further from the truth.  It is important to remember that a formal Technology Assessment is not a Technology Audit.   The use of terminology…

Read More