Blog

Blog

Four Practical Password Tips You Can Actually Follow

Change your password every 90 days. Use a different password for every account. Use a random combination of letters, numbers, and special characters. Don’t use dictionary words. Don’t write your passwords down.

You’ve probably heard all this advice before for creating passwords. You’re also probably ignoring it—realistically, it’s hard for most people to follow this advice on a day to day basis. When security and usability are at odds, most people tend to favor usability.

But productivity and security don’t always need to be at odds. Here are four password tips you can actually follow:

Read More »

What You Need to Know This National Cybersecurity Awareness Month

Like any industry, cybercrime is continually evolving. New trends emerge, and new threats pop up all the time. October is National Cybersecurity Awareness Month, making this the perfect time to review and refresh your cybersecurity knowledge.

Here are four things you need to know right now:

 

Read More »

That Mortgage Document Email May Be Phishing

Like any industry, cybercrime has fads and trends. A recent trend in phishing attacks is especially dangerous for companies in the real estate sector and anyone in the process of buying real estate: phishing emails that look like mortgage documents.

These typically look like emails about closing documents with a link to a fraudulent website intended to steal your login credentials.

Read More »

Can you spot a phishing attack? [Quiz]

One of the biggest misconceptions we still run into with companies when it comes to cybersecurity is around phishing. A lot of people think only naive or stupid people fall for phishing attacks. That's just not true.

Cybercriminals have come a long way, and phishing attacks are harder than ever to spot. Follow the link below to test your knowledge about phishing and see if you can spot an attack.

Read More »

Five Things Every Office Manager Needs to Know About Cybersecurity

Office managers are a critical part of any business—their work literally keeps most offices running. What most people don’t realize (including many office managers themselves) is how vital they are to the cybersecurity efforts of their company.

Here are five things every office manager needs to know about cybersecurity:

Read More »

Watch Out for This Multi-Step Phishing Attack Costing Companies Thousands of Dollars [Video]

 

Don’t want to watch a video? Here’s a summary. Please note, this is not an exact transcript.

We’re talking about a multi-step attack targeting businesses in every industry. This attack can cost you thousands of dollars (we've seen companies lose $100,000+!). We’re a Microsoft partner and have specifically seen this with Office 365 users, but it’s happening with users for all kinds of Cloud accounts, including Office 365, Google for Work, DropBox, etc.

Read More »

When should I upgrade my business from Office 365 to Microsoft 365?

 

If you are already using Office 365, moving to Microsoft 365 is typically a logical jump as your company matures. Microsoft 365 includes parts or all of Office 365, Enterprise Mobility + Security, and Windows 10 (exactly what you get varies by plan), managed in one portal.

The tricky part is knowing when to make the jump, especially if you want to move everyone in your company at once. There are a few times when it makes sense to move:

Read More »

Microsoft Advanced Threat Analytics vs. Advanced Threat Protection: What’s the difference?

Microsoft has cybersecurity products for every area of your network from on-premise servers to desktops to cloud email and storage. However, when you read through a list of names for some of the available security solutions from Microsoft, there might be confusion as to the intended use for each—mostly because the names are all so similar.

Case in point: The Microsoft “Advanced Threat…” line of products: Microsoft Advanced Threat Analytics, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection, Office 365 Advanced Threat Protection. Within this list, there are technologies intended for either enterprise, small business or both and for on-premise, cloud or hybrid deployment.

Most importantly, they all serve different purposes and protect different areas of an organization’s infrastructure:

Read More »

How You Make It Easy to Guess Your Password

Having a compromised account is bad news. At best, it means some headaches. More likely, it’s going to cost you money and resources, not to mention lost customer trust (and some headaches).

Often, the only thing standing between you and a compromised account is your password. And most people are pretty terrible at making up passwords. Most of fall into the same habits when creating passwords, making them really easy to guess.

Read More »

3 Ways to Prevent a Cybersecurity Breach from Ruining Your Vacation

Not much will ruin a vacation faster than getting a call from your office that someone fell for a wire fraud phishing 

But a little bit of planning before you leave the office can greatly reduce the chances of your team falling victim to an attack. Here’s what to do:attack, and your company has lost $100,000. Executive team vacations are a popular time for cybercriminals to strike, especially with CEO impersonation attacks.

Read More »
   
Ultimate Guide to Small Business Cyber Security