by Tony Pietrocola | Mar 2, 2022 | Blog Posts
The recent rise in cyber threats comes as a result of the increase in cloud adoption across the globe, intending to increase business agility and resilience. However, that doesn’t mean electing to use cloud-based-hosted environments will make an organization more...
by Gillian Sweny | Feb 24, 2022 | Blog Posts
Summary: It is known from at least January 2020, through February 2022, the Federal Bureau of Investigation (FBI), National Security Agency (NSA), and Cybersecurity and Infrastructure Security Agency (CISA) have observed regular targeting of U.S. cleared defense...
by Gillian Sweny | Feb 7, 2022 | Blog Posts
It’s not uncommon for organizations to fear moving to the cloud – yet, moving to the cloud is an increasingly popular choice nowadays. Although CIO’s and CTO’s view on-premises hosting to be much more secure, more organizations in the small to mid-size business realm...
by Samantha Parker | Feb 1, 2022 | Blog Posts
Password protection is the most common login and data protection tool today. There aren’t many apps, websites or ecommerce sites that don’t require you to use password protection and that’s just to name a few. It’s often the chosen method of...
by Samantha Parker | Jan 18, 2022 | Blog Posts
SMBs: The Perfect Target The threat of ransomware to small and medium sized businesses (SMBs) has rapidly increased over the last few years, as cyber hackers are now opting to choose easier, smaller targets. Ransomware attacks are costly for hackers to operate and...
by Gillian Sweny | Jan 10, 2022 | Blog Posts
A recent cyber simulation carried out by Positive Technology’s researchers found that external hackers breached 93% of organizations’ perimeter networks and on average gained access to internal systems in just two days. The study covered 45 attack scenarios with...