Vishing: What it is how to protect your business

Posted by Manas Parthasarathy on May 21, 2019 10:10:40 AM

Phishing is a widely known cybersecurity risk; you’ve probably heard of it. A cybercriminal sends a convincing email, complete with a link to what looks like a company’s website at first glance, only to attempt to obtain your login credentials for their own use. Over the past decade, consumers and businesses alike have been taking steps to protect themselves from this threat. What you may not know, however, is that there are various types of phishing attacks beyond those carried out exclusively over email. One such type is vishing.

Read More

Topics: cybersecurity, phishing, vishing

VoIP vs. Landline Phone Systems: What You Need to Know

Posted by Logan LeClair on May 16, 2019 9:45:00 AM

With new developments in telecommunications technology, more and more businesses are making the shift to hosted phone systems for the convenience and cost savings they offer. 

You have likely heard the VoIP vs. traditional phone lines debate. Just like many business owners, you may have tuned this discussion out, without hearing out both sides of the story. The only problem with this, is that your competition didn’t turn its shoulder to the banter, and now has a tailored solution that gives their phone system the ability to grow with them, all for a lower cost.  Don’t let your competition surpass you because of a phone system, and take an in-depth look to help you determine what solution is the best fit for your business.  

If you want to determine if VoIP is the right solution for your business, keep reading to see how it compares to traditional phone lines.

Read More

Topics: VoIP, voice over internet protocol, SDWAN, Hosted PBX, Traditional phone system, MPLS, SD-WAN

7 of the Most Common Phishing Attacks and How to Protect Against Them

Posted by Jill Sullivan on May 15, 2019 7:30:00 AM

With internet access and availability having increased significantly over the past few years, more people now conduct their transactions online. Knowing this, cybercriminals spend considerable amounts of time and money looking for ways to access private personal information or confidential business information for nefarious reasons. Of the many techniques used by cybercriminals to obtain private and confidential information, one of the most endemic is phishing.

Read More

Topics: cybersecurity, email security

Data Breaches: How Much They Can Cost You

Posted by Manas Parthasarathy on May 14, 2019 7:30:00 AM

Imagine the following scenario. You’re sitting at a coffee shop, getting some work done. While you look away, someone comes by and steals your computer. You probably wouldn’t be too happy about this; that computer is worth a lot of money, and you need it to get important things done. Now what if you’re sitting at a coffee shop, getting some work done, and instead of stealing your computer, someone in the coffee shop is stealing information about what you’re doing? What could that data be worth?

Read More

Topics: Data Protection

10 Types of Network Security Attacks

Posted by Jill Sullivan on May 9, 2019 9:37:18 AM

Due to increased public awareness about the importance of keeping online transactions and documents secure, cybercriminals have modified their network attack strategies. Technological advances over the past several years have enabled these cybercriminals to develop more innovative, as well as stealthy, ways to attack computer networks.

Read More

Topics: SECaaS, cybersecurity, Network security

Defining Proper Crisis Communication in IT Organizations

Posted by Sydney Boman on May 8, 2019 7:30:00 AM

With major hacks, hurricanes and other disasters hitting the news lately, disaster recovery planning has become a necessity for every IT organization. We've talked a lot about how to handle a disaster and developing a disaster recovery (DR) plan, but let's take a deeper dive into actually putting a plan into motion.

Read More

Topics: Disaster Recovery, Crisis Communication

10 Cybersecurity Tips for Small Businesses

Posted by Jill Sullivan on May 7, 2019 9:23:02 AM

Over the past several years, there has been a significant increase in the frequency as well as the severity of data breaches. In 2018, ransomware attacks increased by 350%, spoofing increased by 250%, and spear-phishing increased by 70% overall. Furthermore, the average total cost of a data breach for an individual company increased from $3.62 to $3.86 million, an increase of 6.4%.

Read More

Topics: Data Protection, cybersecurity

How to Know If a Hybrid Cloud Is Right for Your Business

Posted by Manas Parthasarathy on May 2, 2019 7:30:00 AM

Cloud technology can be difficult to understand. Being fairly abstract in meaning, it’s easy to forget that there isn’t just one deployment that’s compatible with cloud computing. In fact, not every cloud computing solution is right for every type of company.

Read More

Topics: Hybrid Cloud, cloud migration

How Crypto-Jacking Can Harm Your Business

Posted by Matthew Fall on May 1, 2019 7:30:00 AM

If your business is concerned about cybersecurity and you haven’t heard about crypto-jacking, you’ll need to catch up quickly. You may have heard about ransomware, but crypto-jacking has now become the more popular technique for cyber-criminals to attack and profit off your business. In 2018, occurrences of crypto-jacking increased by 450%. According to a study, Youtube, the Los Angeles Times, and even Showtime have fallen victim to crypto-jacking. Here’s how crypto-jacking can harm your business and what you can do to stop it.

Read More

Topics: Security as a Service, email security, crypto-jacking

What You Need to Know About Preventing Data Breaches

Posted by Manas Parthasarathy on Apr 30, 2019 7:30:00 AM

High profile data leaks and security breaches have been commonplace in the past few years, with instances of high-profile breaches of large tech companies often making the news. However, it’s not just tech giants who are at risk of having their business’ or their customers’ data accessed by outside entities; small and medium-size organizations across all industries can be at risk as well. Recently, such an example manifested at Georgia Tech University, where an unauthorized user of a university web application exposed information like names, birth dates, and social security numbers for up to 1.3 million people. The implications of these leaks can range from an outside actor simply viewing the data to find anything of use, to using the information they extract to discover perceived weaknesses at your firm, or even demanding a ransom for disposing of the data.

Read More

Topics: SECaaS, Data Protection, cybersecurity

Subscribe to our Blog!

DR Guidebook CTA

Recent Posts

Posts by Tag

See all