March 3, 2022
Most (not all) cyber-related incidents can be avoided through proper planning and by having the right resources in place. Preparation is what makes all the difference, which entails outlining your risks, implementing safeguards to aid in prevention, and knowing who to bring in and when in the event of a cyber incident. After a cyber incident has occurred, time is of the essence to lessen the...
January 10, 2022
If you’re one of the more than 300,000 companies in the defense industrial base’s (DIB) supply chain, you’re probably familiar with the Department of Defense’s (DoD) Cybersecurity Maturity Model Certification (CMMC). If not, here’s a quick definition courtesy of the Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD(A&S)): “The CMMC is a framework that includes a...
November 13, 2019
As cybercriminals and cyber threats—as well as cybersecurity—all continue to evolve, the list of ways to protect your company could number into the thousands. But for now, to avoid putting you to sleep, we’ve compiled just a few guidelines for protecting your company and your employees.
October 23, 2019
According to the latest cybersecurity industry research, market demand for Managed Detection and Response (MDR) services continues to climb. In fact, experts forecast that by 2024, 40% of midsize enterprises will use MDR as their only managed security service. That might sound like a large percentage, but because of the continued escalation of cyberattacks, more and more companies are realizing ...
July 12, 2019
Did you know that aside from being a preventive measure to curb the multitude of damages caused by a cyberattack, a solid cybersecurity plan can help your business flourish?
May 28, 2019
Michael McCartney joins Susan Rose and Brian Mazurowski of WBEN to discuss ways to help keep yourself and your data safe while connecting to public WiFi or USB charging stations.
January 8, 2019
After yet another year marked by an excessive amount of high-profile cyber-attacks and data breaches, every company, no matter the size, should now expect to be breached. There is a dangerously unstable balance between the ever-increasing cyber threat and cybersecurity solutions. Increasing threats across industries, and the proliferation of connected endpoints to a myriad of corporate computing...
August 28, 2018
Just as our devices—computers, phones, tablets—are basically outdated by the time we exit the store, the same is happening for cyberattack protection. Our technology is continually becoming more sophisticated, and cybercriminals are keeping up.
July 24, 2018
Why Antivirus Protection Isn’t Enough. As young students, when we didn’t want someone cheating off of our tests or papers, we put up a folder or Trapper Keeper as a barrier on our desk. This worked great unless someone stood up alleging that they had to use the bathroom. That scoundrel* then had the opportunity to peek over the makeshift boundary.