<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL

Smishing, Vishing, Spear-phishing - why these types of cyber attacks happen and what can you do

Most of the data breaches we hear about on the news are executed to extract money or personal information from its[…]

Microsegmentation - Protect your internal network

What is Microsegmentation? Microsegmentation is a method of heightening network security by logically splitting up[…]

Ransomware is on the Rise, Recent Attacks

Ransomware attacks are on the rise this year, crippling cities and organizations that unfortunately fall victim to[…]

How a cyber range helps IT security teams in getting ready for a cyber attack

Imagine a team of IT security professionals connecting to a simulated security environment, when suddenly one of them[…]

Medical Device Security Risks: What Healthcare institutions can do

Medical devices, just like any other Internet of Things (IoT) object, are prone to hackers. These hacks can get[…]

Invoice Scams - The New Emerging Threat in Cybersecurity

Phishing scams have long been an effective social engineering technique used by criminals to adversely affect[…]

November 30 is National Computer Security Day!

Following #NationalCyberSecurityAwareness Month, we celebrate #ComputerSecurityDay. Help spread the word on social[…]

Can Your Business Benefit From A Part-Time CISO or VCISO?

Can your business benefit from a part-time CISO? Table of Contents: A real story of risks found on a site and how this[…]

Keep your business data secure while traveling on a business trip

How do you keep your business data secure while traveling on a business trip? These days, with digital technologies[…]

Eight tips for an effective phishing test at your organization

Eight tips for an effective phishing test at your organization You have provided security training to your employees.[…]
Subscribe to our Blog!