Here's Why You Need A Password Manager
by Justin Leach on April 28, 2023 at 10:45 AM
My mother bragged to me once that she is very good with technology. When I (her free tech support) raised an eyebrow at this, she pulled out a notepad that had handwritten notes on how to change the TV input from cable to the DVD player.
Penetration Testing: Understanding Red, Blue, & Purple Teams
by William DePalma on April 11, 2023 at 1:00 PM
Data breaches are growing more expensive by the day. The average cost of a data breach is projected to reach $5 million by the end of 2023, up from $4.35 million in 2022. Penetration testing, or pen testing, helps you uncover unknown vulnerabilities and compliance gaps within your org …
ProxyNotShell – Microsoft Exchange Exploit Explained
by Andrew Paull on March 23, 2023 at 1:15 PM
ProxyNotShell – What is it? Cyberattacks have become increasingly sophisticated and widespread in recent years, with hackers constantly finding new ways to infiltrate networks and steal sensitive information. One such vulnerability that has recently come to light is ProxyNotShell, ide …
What Is Password Spraying? How Can It Affect Customers?
by Jesse Roberts on March 15, 2023 at 2:00 PM
Brute force attacks like password spraying have been on the uptick recently, according to Microsoft's team of experts. Although only about 1% of these attacks are successful, they can be devastating. Affected companies often suffer serious financial and reputational damage.
Not Using Multifactor Authentication? Your Days Are Limited!
by Derek Boczenowski on February 22, 2023 at 2:30 PM
Despite the fact the multifactor authentication (MFA) has been around for decades at this point, the majority of both business and personal logins only use it when absolutely necessary. The complaints are well known; it takes too long to login, if I forget my phone or token I can’t lo …
Making Sense of Data Management
by Jeffrey Torrance on February 9, 2023 at 2:45 PM
Organizations face a prevalence of both internal and external cyber threats. This makes data management one of the most critical components in an organization’s cybersecurity program. From classifying data, to ensuring it is handled with the appropriate security precautions, to ensuri …