Change layout
5 Critical Cybersecurity Tips for SMBs in 2019

5 Critical Cybersecurity Tips for SMBs in 2024

5 Critical Cybersecurity Tips for SMBs in 2024

If you run a small business, you might not think that you are a priority target for hackers. But you'd be wrong and here are 5 critical cybersecurity tips.

Small and Medium-Sized Businesses (SMBs) are among the most frequent target for cyber attacks. Even the smallest business holds a wealth of personal information on customers, employees, and other businesses. In addition, SMBs are at greater risk for cyber attacks because they tend to be easier targets, and don’t always have the resources that larger organizations can deploy to protect themselves. Continue reading

How to Keep Your Office 365 Tenants Secure: Part 2

Securing Your Office 365 Tenants. Part 2

Securing Your Office 365 Tenants. Part 2

In this article, we will be reviewing the next set of recommended steps to take to secure an Office 365 tenant. These steps revolve around Office 365’s built-in protection policies, including Anti-Spam, Anti-Phishing, Anti-Spoofing, custom Mailflow transport rules, and a few general organization-wide policies. Continue reading

Don’t miss new articles!
Thank you for subscribing!
HAMR vs MAMR

Hard Drive Revolution in 2020?

Hard Drive Revolution in 2020?

When we think about large data storage, the first things that spring to mind are magnetic hard drives, as SSD technology is more about speed than volume. Next year might be revolutionary for the HDD industry since major manufacturers - Seagate and WD - presented their new solutions which significantly improve data writing density. BTW, there are lasers and microwaves involved.

Continue reading

Don’t miss new articles!
Thank you for subscribing!
Securing Your Office 365 Tenants

Securing Your Office 365 Tenants. Part 1

Securing Your Office 365 Tenants. Part 1

In the last article, we went over addressing a compromised account, taking the response actions to ensure the account is safe and back under the end user’s control.

Now, as a follow up to the previous article, we will review the actions needed to properly secure an Office 365 tenant. These steps are geared towards MSPs who manage multiple Office 365 tenants and require some level of automation to configure Office 365 tenants in bulk. Continue reading

How To Detect and Defend Against Triton Malware

How To Detect and Defend Against Triton Malware

How To Detect and Defend Against Triton Malware

Cyber attacks aimed at breaking through network monitoring defenses and raiding Industrial Control Systems (ICS) and mangling the Industrial Internet of Things (IIoT) is nothing new.

These kinds of attacks have been around since the first company website was launched. From stealing data to altering information to shutting down software and hardware, the threats are there and growing more sophisticated every day. Continue reading

Clone Phishing Explained

Clone Phishing Explained

Clone Phishing Explained

Attempts to infiltrate malware onto computers systems typically come from one of two sources: email and web sites. The most effective often use both. Phishes are one type of email used to attempt to get users to click on a link that will either get them to install malware or enter user credentials that can be used to infiltrate a real website. Continue reading

AWS Free Tier Cloud Messaging

How You Can Use AWS Free Tier: SQS, SNS, SES

How You Can Use AWS Free Tier: SQS, SNS, SES

This is the third in a three-part series covering the Amazon Web Services (AWS) free tier. In our previous articles, we reviewed the free tier for the AWS compute and database offerings. In this article, you will learn about the messaging options provided by AWS. We will cover Amazon Simple Queue Service (SQS), Amazon Simple Notification Service (SNS), and Amazon Simple Email Service (SES). Continue reading

Load more