Security and Compliance

phishing-and-social-engineering-attacks
Employee Awareness of Phishing & Social Engineering Attacks 1024 645 Managed Solution

Employee Awareness of Phishing & Social Engineering Attacks

As written by Rob Walker. Employee behavior is considered one of the main reasons why phishing attacks can be effective. With proper education your staff can be made aware of…

read more
how-to-us-microsoft-secure-score-to-tell-if-you're-secure
How to Use Microsoft Secure Score to Tell if You’re Secure 700 400 Managed Solution

How to Use Microsoft Secure Score to Tell if You’re Secure

Image source: https://www.microsoft.com/en-us/us-partner-blog/2017/02/21/office-365-partners-office-365-secure-score/ Security issues are becoming an ever growing concern across the digital landscape. As such, numerous security solutions have been developed as a means of counteracting these threats.…

read more
office-365-vs-google-docs
Office 365 vs Google Docs From a Security Perspective 1024 576 Managed Solution

Office 365 vs Google Docs From a Security Perspective

Numerous factors go into choosing a cloud platform for an organization. Among these, we can count things such as access, design, functionality, and, of course, security. As the business landscape…

read more
security-features-of-office-365
What Are the Security Features of Office 365? 1024 576 Managed Solution

What Are the Security Features of Office 365?

With more and more companies embracing cloud computing, the long-held misconception that it isn’t secure is fading away. If you are already using Office 365 or are intending to do…

read more
phishing-attacks-can-now-bypass-multi-factor-authentication
Phishing Attacks Can Now Bypass Multi-Factor Authentication 1024 576 Managed Solution

Phishing Attacks Can Now Bypass Multi-Factor Authentication

The healthcare industry has been steadily moving towards consumerization. It means that, as the industry moves towards value-based care and patients demand easier access to their data, cyber threats are…

read more
5-ways-to-prepare-for-california-consumer-privacy-act
5 Ways to Prepare for California Consumer Privacy Act 1024 576 Managed Solution

5 Ways to Prepare for California Consumer Privacy Act

With the European Union’s General Data Protection Regulation (GDPR) implementation on May 25, 2018, a somewhat similar type of regulation will shortly be introduced in the United States, as well.…

read more
end-user-security-training-is-important
Why End User Security Training Is Important in Today’s Digital Environment 1024 576 Managed Solution

Why End User Security Training Is Important in Today’s Digital Environment

Over the past several years, cybercrime has hit record highs. And as businesses become ever more technological and interconnected, digital crime is only set to rise. The cybersecurity of every…

read more
5-cyber-security-training-tools-and-resources
5 Cyber Security Training Tools and Resources 1024 576 Managed Solution

5 Cyber Security Training Tools and Resources

When it comes to data breaches, in particular, cybercrime is at an all-time high. According to the statistics, over 21% of all files are not protected in any way. Also,…

read more
how-to-tell-if-your-network-is-secure
How to Tell If Your Network Is Secure 470 246 Managed Solution

How to Tell If Your Network Is Secure

As the internet is becoming a dominating force around the world and computer networks are growing in size and complexity, data integrity is also an ever-growing concern that organizations need…

read more
disaster-recovery-plan-checklist
What Is a Comprehensive Disaster Recovery Plan Checklist? 470 246 Managed Solution

What Is a Comprehensive Disaster Recovery Plan Checklist?

With more unpredictable and extreme weather events as a direct result of climate change; the need for a comprehensive disaster recovery plan (DRP) cannot be overstated. Be it earthquakes, flash…

read more