View Post

5 Myths About Data Breaches

In Security by Alex PattersonLeave a Comment

Not sure what’s fact and what’s fiction when it comes to data breaches? Check out the top five data breach myths we’ve heard of…and the reality behind them! Data Breach Myth 1: Only Major Companies get Targeted for Data Breaches Reality: Any company of any size can be the target of a cyber-attack. We often only see news reports about …

View Post

Collection #1 Data Breach – What You Need to Know

In Security by Shelly KramerLeave a Comment

If you’ve not yet heard, there’s been yet another data breach. So, what’s new, right? Security breaches most often occur because of a lack of awareness around security and, to be honest, because most of us are fairly lazy when it comes to password security. The Collection #1 data breach is no ordinary breach, impacting some 772,904,991 email addresses and …

View Post

How To Avoid Being the Victim of a SMiShing Attack

In Security by Alex PattersonLeave a Comment

SMiShing is not a new tactic. A form of phishing, SMiShing is an activity that involves someone attempting to trick you via text or SMS message. If the trick is successful, the individual will receive your critical personal information. Did you know that there are approximately 913,242,000 texts sent every hour of every single day around the globe? This translates …

View Post

Are You PhishProof?

In Security by Alex PattersonLeave a Comment

Phishing is one of the most common forms of cybercrime, so if you’re online, you’ve likely been targeted by a phishing attack—and you might not even know it. So what is phishing exactly? It’s the act of collecting personal information—including bank account numbers, passwords, and usernames—through electronic means, such as deceptive email messages and phone calls. According to RSA’s report …

View Post

How to Identify a Phish and How to Protect Against Phishing

In Security by Shelly KramerLeave a Comment

Holiday season means phishing season, and that’s not the good kind of fishing that you do while you’re relaxing out on the lake—it’s the cybersecurity nightmare kind of phishing and it poses big risks for businesses of all sizes. My guest on the Converge TechTalk show today is Mison Riggins from Inspired eLearning and we’re talking about cybersecurity and the …

View Post

Instagram Phishing: How to Prevent It and What to Do If It Happens to You

In Security by Patricia EvansLeave a Comment

Phishing is the most popular way to hack Instagram accounts, because, according to the hackers themselves, it’s the easiest! Instagram Phishers simply create a fake login page that looks just like the one on the “real” Instagram. Hackers create this spoofed login page through fake apps promising to help manage Instagram users’ accounts and use free hosting and paid accounts …

View Post

5 Reasons DevOps and Security Need to Work Together

In Security by Daniel NewmanLeave a Comment

There is nothing like speeding up your business processes and development cycles is there? DevOps has revolutionized the way businesses meet the constantly evolving needs of their customers, without sacrificing productivity. Even as good as it sounds, it can still come at a price if DevOps and security are not working together. With the speed at which new iterations are …

View Post

How to Create an Effective Business Continuity and DR Plan

In Security by Toby OwenLeave a Comment

We rarely get a warning when disaster is about to strike, be it a natural disaster or a cyberattack. Your best chance at detecting, containing and responding to a disaster of any kind is through a tested and proven plan. An effective business continuity plan and DR Plan provides detailed instructions before, during and after disaster strikes—and can make or …

View Post

CyberSecurity—The Greatest Challenge CISOs Face Today

In Security by Shelly KramerLeave a Comment

What a time to be alive! The rapid advances of technology and dawn of an era dominated by the Internet of Things (IoT) has changed pretty much everything about life as we know it. Which is why it’s no surprise that cybersecurity is perhaps the greatest challenge CISOs face today. But let’s back up. Why is the IoT such a …