Current Events

Digital Workplace Mistakes Most Businesses Make

The pandemic experience is one that all businesses share. It required major adjustments on how they operate. It no longer makes sense for everyone to work in the office. Many businesses are still adjusting to the remote work model. This blog post will go over the digital workplace mistakes most businesses make. Due to the…

Twilio Data Breach and Massive Lay Offs

AWAH-Twilio On this installment of “Another Week, Another Hack” we’re talking about Twilio.  More importantly, we’re talking about the Twilio data breach and massive lay offs that transpired this week. Twilio, for those of you who don’t know, is an engagement platform that partners with multiple big named corporate entities.  Unfortunately, the communications giant announces…

Exciting Ways Microsoft 365 Supports the Hybrid Office

The newest buzzword in business is the “hybrid office.” Hybrid work is a combination of employees working both in office and from home. For many businesses, this is becoming a reality rather than just a trendy term. So we wanted to break down some exciting ways Microsoft 365 supports the hybrid office. Looking at a…

Understanding Microsoft’s Productivity Score

It might be difficult to monitor productivity regardless of where employees locate. How can you be sure they’re making the best use of their resources? How can you make it so they can use best practices? Let’s get into understanding Microsoft’s productivity score. Managers are constantly asking themselves these questions. If they look at the wrong metrics, it…

Microsoft Disabling Basic Auth This Fall

It’s happening, Microsoft is making the decision to disable basic authentication. With the latest threats to cybersecurity, it’s important to know whether this is going to be a helpful decision, or not. So, let’s get into everything you need to know about Microsoft disabling basic auth this fall. What is Basic Auth? Come October 2022,…

Elden Ring Publisher Faces A Major Data Breach

Today’s edition of “Another Week, Another Hack” is for the gamers out there. Fans of popular video games such as Ace Combat, Dragon Ball Z, and Dark Souls be aware, your information may be public now. That’s right, we’re talking about Bandai Namco, the Elden Ring publisher, faces a major data breach by ransomware group,…

How the SLAM Approach Can Help Detect Phishing

There is a reason you almost always see phishing as a part of security awareness training. It has been the primary method of online attack over the past decade or two. Phishing emails are used to initiate ransomware, credential theft, data breaches and more. In an effort to keep you protected, learn how the SLAM…

Keep Hackers From Accessing Your Online Accounts

These days, malicious actors want access to all your data. Stolen login credentials have become a hot commodity, especially on the Dark Web.  So, how do we keep hackers from accessing your online accounts? Let’s get into it.  Why Hackers are Accessing Online Accounts If you didn’t know, the Dark Web has a price for…

Apple is Now Selling Parts to Fix Your Own iPhone

Don’t you hate it when your phone breaks? It can feel like such an inconvenience especially with a limited amount of options to fix it… but maybe not for long. Let’s talk about an announcement that Apple is now selling parts to fix your own iPhone.  We’ve all been down this road before. When you…

Which Form of MFA is Most Secure Vs. Most Convenient?

The prevalence of data theft is now at an all-time high, and it is this form of attack that is most responsible for data breaches. That’s why implementing Multi-Factor Authentication (MFA) is more important than ever. In this blog post, we’ll go over which form of MFA is most secure vs. most convenient. Having access…