Cybersecurity

Small Businesses Are Hacked 3x More Than Larger Ones

Have you felt more protected from cybersecurity attacks because your business is smaller? Perhaps you believe the business possesses nothing that a hacker could want. How can they even know about your small business? Well, let’s get into why small businesses are hacked 3x more than larger ones. This thought processes is a common misconception…

How Outsourcing IT Can Save You Money

If you clicked on this video, you are probably struggling with your business’s IT. Whether that means you’re paying too much for an in-house person or have no idea where to start, this one’s for you. Here’s how outsourcing IT can save you money.  Let’s get into it.  What is Outsourced IT? When I talk…

Most Common Misconceptions About Ransomware

Businesses of all sizes face a daily threat from ransomware attacks. Last year alone, US businesses lost up to $160 billion as a result of ransomware attacks. Unfortunately, this number is anticipated to grow in the years ahead. For those of you who question whether ransomware would ever effect you, let’s get into the most…

Twilio Data Breach and Massive Lay Offs

AWAH-Twilio On this installment of “Another Week, Another Hack” we’re talking about Twilio.  More importantly, we’re talking about the Twilio data breach and massive lay offs that transpired this week. Twilio, for those of you who don’t know, is an engagement platform that partners with multiple big named corporate entities.  Unfortunately, the communications giant announces…

Why You Shouldn’t Use SMS for Multi-Factor Authentication

We mention Multi-Factor Authentication quite a lot. This is because it is basically the easiest thing someone can implement to protect your data from cyber threats. Unfortunately, most people choose the text-to-verify option. Here’s why you shouldn’t use SMS for multi-factor authentication.  Importance of Multi-Factor Authentication Multi-factor authentication (MFA), or two-factor authentication as it was…

5 IT Standards All Businesses Should Adopt

It’s common for small businesses to mistakenly ignore standards. They believe that having structures in place is unnecessary. When an issue arises, they’ll just hire the personnel to deal with it and consider that sufficient. Unfortunately, this mindset is very risky. That’s why we put together a list of 5 IT standards ALL businesses should…

Microsoft Disabling Basic Auth This Fall

It’s happening, Microsoft is making the decision to disable basic authentication. With the latest threats to cybersecurity, it’s important to know whether this is going to be a helpful decision, or not. So, let’s get into everything you need to know about Microsoft disabling basic auth this fall. What is Basic Auth? Come October 2022,…

Worst Hacks of 2022

Today, we are talking about some of the worst hacks of 2022. I don’t know about you, but the past few months of 2022 have been a whirl wind. Whether the first half of 2022 has felt endless, fleeting… or both, we can all agree it’s been a lot. On top of everything, massive hacks,…

Elden Ring Publisher Faces A Major Data Breach

Today’s edition of “Another Week, Another Hack” is for the gamers out there. Fans of popular video games such as Ace Combat, Dragon Ball Z, and Dark Souls be aware, your information may be public now. That’s right, we’re talking about Bandai Namco, the Elden Ring publisher, faces a major data breach by ransomware group,…

How the SLAM Approach Can Help Detect Phishing

There is a reason you almost always see phishing as a part of security awareness training. It has been the primary method of online attack over the past decade or two. Phishing emails are used to initiate ransomware, credential theft, data breaches and more. In an effort to keep you protected, learn how the SLAM…