The weak link in your cybersecurity

The three pillars of cybersecurity are: People, Processes, and Technology. Each part is critical to the security of any organization, however, many of us focus solely on the technology piece. We treat it like a “silver bullet” that will solve every security issue. 

As people, we naturally resist change. We like convention and the processes we’re used to. Unfortunately, that can make us the weak link in our...

New coronavirus symptom: phishing?

There are 3 sure things in this world: death, taxes, and email scams. Evolving far past the Nigerian Prince scheme, “phishing” attacks are quickly becoming the biggest email security concern. Phishing refers to an email that fraudulently impersonates a reputable entity in order to steal information from you. Reports show over 3 billion fake emails are sent daily and it is estimated that phishing causes $17,700 of damage every...

Why you need Two-Factor Authentication (2FA) now more than ever

Despite the constant bad news about data breaches, password hacking, phishing, and account takeover, there is a bright spot: by using Two-Factor Authentication (2FA) you can easily add an additional layer of security to any login. 2FA takes the simple username/password system to the next level. You may already be using 2FA for banking or social media websites. Logging in by getting a text with a one-time code is an example of 2FA in...

Zoom safely!

Zoom has recently been embraced by millions of people around the world trapped in their homes by the coronavirus. Unfortunately, Zoom’s sudden rise in popularity has not come without growing pains. In the last few weeks Zoom has been buried in an avalanche of bad press after numerous security flaws have been revealed. One US middle school held a virtual classroom that was suddenly disrupted when a hacker joined and shared obscene adult content. This trend is now known as...

How COVID-19 is already impacting your IT infrastructure

As the world adjusts to life during a quarantine, here are 3 statistics that show COVID-19 is having a bigger impact on your IT infrastructure than you thought:

Back in “normal times,” only 2.9% of the total U.S. workforce worked from home at least half of the time (based on a 2017 report*). Although the exact number is hard to pinpoint, a new poll says that 88% of organizations are estimated to...

Is your IT department coronavirus-proof?

Traditionally, we think of Disaster Recovery as a way to combat things like physical calamity, data loss, and criminal acts, but what if something happens to your IT manager? Are you prepared? By identifying problems before they happen, and putting a plan in place, you can position your business to tackle every obstacle.

Many businesses use the “bus test” as an extreme What if. What if a key employee gets hit by...

6 tips for remote employees

As companies respond to the global demand for remote work options, staying secure at home is crucial. Whether you’re provisioning corporate laptops or letting your employees use their personal devices, here are some things to consider:

Church Security Management Challenges

House of worship (or church) business operations, regardless of specific religion, are challenging across the board; and security management is no exception. Unlike corporate America where managers have the option to screen new hires and evaluate resources solely on performance, most church teams and committees are comprised primarily of volunteers; security teams included. Security managers operating in a church ecosystem are faced with needing to protect assets without...

12345