Ransomware Attack: Are You Vulnerable?

Dear Valued Customer, Ransomware attacks are skyrocketing, impacting large and small businesses and disrupting entire supply chains. No business, no industry is immune to ransomware attacks. In fact, in the past 12 months, 23% of small businesses suffered at least one cyber attack, with an average annual financial cost of $25,612. Not only that, although…

Read More

What Is Multi-Factor Authentication?

Multi-factor authentication (MFA) is a security process that requires users to respond to requests to verify their identities before they can access networks or other online applications. MFA may use knowledge, possession of physical objects, or geographic or network locations to confirm identity. Why is multi-factor authentication needed? As organizations digitize operations and take on…

Read More

Help secure your accounts with these strong password tips

It’s no secret that passwords have substantial monetary value to cybercriminals. The importance of using secure, unique passwords is growing as you entrust increasing amounts of personal information to organizations and businesses that can fall victim to data breaches and password leaks. Although there may be little you can do to prevent a large-scale data…

Read More

Five Steps to Creating a Cyber Security Incident Response Plan

Concern for cybercrime has increased 62% in the past year. Over 41,600 incidents and 2,013 confirmed data breaches were investigated by Verizon and its partners in the past year. The numbers paint a dark picture of the growing threat to businesses of all sizes – concern for cybercrime has increased 62 percent in the past…

Read More

Ransomware Attack: To Give or Not To Give, that is the question.

The definition of ransomware, according to the Cybersecurity & Infrastructure Security Agency, is an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Recent attacks on large businesses, hospitals and government departments would lead one to believe that ransomware attacks are solely…

Read More