Today is a day dedicated to pranks, and this leaves many people on high alert for suspicious activity; whether it be in your home, when someone calls you, or even your email inbox. Unfortunately, that careful eye watching out for something out of the ordinary is not always so concentrated. With phishing scams becoming more…
Prioritizing Threats and staying ahead of the Cybercriminals
The methods of attack and the strategies of the people that attack our networks and data resources continue to evolve. Those of us responsible for protecting resources need to stay ahead of the threats. And as the threats change, the cybercriminals are using new tools to obscure their existence and evade detection. Ransomware is a…
Endpoint Security
Endpoint security is the weak link in many organization’s security strategy. We spend time securing the network assets, including company-owned endpoint devices and then we allow personal devices access to these same networks. It might be a manufacturing company that hosts a sales meeting for people from across the region. Or it might be a…