What is Multi-Factor Authentication & Why You Need It

While cyber-attacks on organizations have become more complex over the years, basic attacks—such as email phishing— are still effective ways of gaining access to an organization’s sensitive and critical information.  While many organizations deploy multiple layers of IT security to protect their systems and data against attack, tho…

New Year’s Resolutions For Cybersecurity

Have you made your New Year’s Resolutions to lose weight, exercise more, and quit smoking?  Don’t forget to add a few resolutions for your organization’s cybersecurity. Below are 5 resolutions that will get you on the road to improving your organization’s cybersecurity posture and reducing your risk. Resolution #1 As a busines…

How To Avoid Tech Support Scams

Tech scams are on the rise around the world. According to the FBI’s 2016 Internet Crime Report, almost 11,000 tech support scams caused $8 million in losses in that year alone–and that’s just what was reported.  All technology solution providers should be sharing ways to regularly help their customers recognize the red flags befor…

Server Outages Aren’t An IT Problem; They’re A PROCESS Problem.

During many discovery conversations with new clients, a common pain point is often raised by CEOs, COOs, and CFOs.  Their feedback is that server outages are costly and painful, and some mention outages lasting multiple days.  While these outages are costly and painful, they can be avoided by PROCESS, not IT.  When a business or organi…

Real Stories of Cyber Attacks

  Here are a few quick sketches of actual cyber attacks, for CEOs to consider: Wire transfer fraud in the C-suite A hacker used social engineering to impersonate a CEO — over both email and phone — and convinced a CFO to wire funds to their account over the holidays. The company lost $400,000 in fraudulent wire transfers. …

Cybersecurity is a CEO Problem

Far too many SMB CEOs mistakenly believe cybersecurity is an IT problem.  Most SMB IT lack the organizational authority to run a cybersecurity program effectively.  SMB CEOs have to take back the authority they have abdicated to IT. Only the CEO has the decision rights necessary to make the trade-off calls that have to be made. A CEO is…

Sign up for our newsletter – monthly IT insights delivered right to your inbox.