Our Networking & Cybersecurity Blog
Recent Posts
Our Predictions for the 2021 Cybersecurity Environment
2020 was a rough year for all of us, particularly from a cybercrime perspective. As businesses and schools rapidly pivoted to remote work and remote learning, many cybercriminals changed their tactics and adjusted their focus to take advantage of the situation as well...
The Digital Partridges in the Cybercrime Pear Tree
The holidays may be a time for spending time with loved ones and exchanging gifts, but the gifts cybercriminals bring aren’t jolly at all. 2020 Has been a rough year, and many organizations have felt the strain, particularly when it comes to cybersecurity and adapting...
Identity Management is Really Just Cybersecurity Best Practices With a Fancy (& Expensive) Name
Identity management, as a concept, has been around for a while, although many of us are just hearing about it now. It sounds impressive, but what does it really mean, and are there steps your organization should be taking to ensure you have good identity management...
In a Remote World, Social Engineering is Even More Dangerous
Remote work has changed how many of us conduct our day to day work tasks and brought with it new cybersecurity dangers. Though social engineering has been around for decades, the shift to remote work has brought with it a resurgence in this common technique, and many...
The Modern Hacker: Who They Are, Where They Live, & What They're After
Hacking, the act of gaining unauthorized access to or otherwise compromising digital devices and networks, is an evolving and ongoing threat. When many of us imagine a hacker, we think of a lone mischievous teenager writing malicious code in a dark basement, but the...
Hackers Are Increasingly Targeting People Through Their Phones
We do so many things on our smartphones: We stay in touch with friends and colleagues, we do our banking, we look for work, and so much more. Unfortunately, while phones have made it easier than ever to go about our everyday lives, they also offer another way hackers...