by Samantha Parker | Jun 21, 2022 | Blog Posts
What is SOC Compliance? The term SOC stands for Service Organization Control. SOC compliance refers to whether a service provider meets the set of standards in a SOC audit, created by the American Institute of CPAs (AICPA). SOC audits are not a mandatory requirement...
by Samantha Parker | Jun 9, 2022 | Blog Posts
According to Accenture’s Cost of Cybercrime Study, 43% of cyber-attacks are aimed at small businesses. What’s even more alarming is that only 14% of those small businesses reported being prepared to defend themselves in the case of a cyber-attack. SMBs are now facing...
by Samantha Parker | May 24, 2022 | Blog Posts
Cybersecurity in Educational Institutions When a hacker is looking for their next target, they typically go after organizations with poorly guarded systems. It is common knowledge that most K-12 schools do not have the funding or resources for a fully operational...
by Gillian Sweny | May 16, 2022 | Blog Posts
More often than not, business leaders’ attitudes towards the deployment of security tools are set-it-and-forget-it. Yet, the state of cybersecurity is everchanging; it isn’t a passive endeavor. If it were, cyberattacks would be put to bed and never spoken of again....
by Samantha Parker | May 2, 2022 | Blog Posts
What is Spear Phishing? Don’t let the terminology confuse you– spear phishing is not the act of hunting for fish in the ocean, it’s a specific type of phishing attack where cyber criminals use detailed personal information to attack a specific individual or...
by Gillian Sweny | Apr 19, 2022 | Blog Posts
Understanding the cybersecurity terminology and acronyms can have your head spinning. Whether you’re just beginning to understand the industry or a veteran who is trying to keep up with new buzzwords, we have you covered. In this post, we will be breaking down three...