Jun 30, 2022 | Cyber Threats, Cybersecurity
You may have heard about Log4j earlier this year. It was a big enough deal that it received coverage on mainstream news sites. Log4j refers to a common software utility that’s commonly found on many web services. Its intended use is for logging the health and activity...
May 17, 2022 | Cyber Threats, Cybersecurity, IT Security
By now, you most likely know there has been an increase in the number of cyberattacks on small and midsized businesses, but you may not know the level of sophistication many cybercriminals have when it comes to planning and executing attacks. We break down the...
May 3, 2022 | Cyber Threats, Cybersecurity, IT Security
With more people working from home or in hybrid situations, employees are more vulnerable than ever to cyberattacks. From using personal devices and public wifi to lack of security awareness, it’s more important than ever for you and your team to understand the...
Apr 26, 2022 | Cyber Threats, Cybersecurity, IT Security
If you get caught in a business email compromise, the process can start a new string of related attacks on your associates, partners, customers, and vendors. Financial fraud, relationship exploits, ransomware, and business disruption are all likely outcomes of an...
Jan 18, 2022 | Cyber Threats, Cybersecurity, IT Security
The anonymity of the dark web is what makes it dangerous. It allows hackers to roam without surveillance, making it the center for illicit activities. Understanding the dark web, data breaches, how to react if your sensitive data is exposed, and how to protect your...
Dec 17, 2021 | Cyber Threats, Cybersecurity, IT Security
Log4j is a common software utility that’s commonly found on many web services. Its intended use is for logging the health and activity of those web services for administrators, providing insights into the services’ health, performance, and utilization. A vulnerability...