Employee Awareness of Phishing & Social Engineering Attacks
As written by Rob Walker. Employee behavior is considered one of the main reasons why phishing attacks can be effective. With proper education your staff can be made aware of…
read moreAs written by Rob Walker. Employee behavior is considered one of the main reasons why phishing attacks can be effective. With proper education your staff can be made aware of…
read moreImage source: https://www.microsoft.com/en-us/us-partner-blog/2017/02/21/office-365-partners-office-365-secure-score/ Security issues are becoming an ever growing concern across the digital landscape. As such, numerous security solutions have been developed as a means of counteracting these threats.…
read moreThe healthcare industry has been steadily moving towards consumerization. It means that, as the industry moves towards value-based care and patients demand easier access to their data, cyber threats are…
read moreToday’s many technological revolutions are changing the business environment, almost beyond recognition. When it comes to the financial sector, artificial intelligence (AI) is finally addressing some long-pressing compliance issues. Out…
read moreOver the past several years, cybercrime has hit record highs. And as businesses become ever more technological and interconnected, digital crime is only set to rise. The cybersecurity of every…
read moreWhen it comes to data breaches, in particular, cybercrime is at an all-time high. According to the statistics, over 21% of all files are not protected in any way. Also,…
read moreActive Directory Isn’t Enough Identity and Access Management goes way beyond just Active Directory these days. Do you have the tools in place to empower the “always on” worker, the…
read moreHow can you keep data safe during festival season? Mobile Device Management Protect at the “front door” Our solution starts with identity protection capabilities to secure access at the “front…
read moreGeorgia State University tackles malware with Office 365 Advanced Threat Protection By Ren Flot, chief information security officer and director of cyber security at Georgia State University as written on…
read moreTrick-or-Treat: Google Apps for Work vs. Office 365 By Kelly Cronin Do you want a trick, or a treat? If you’re looking for an office treat, Office 365 for…
read more