5 Ways to Prioritize Cyber Security in a Hybrid Workspace
In this day and age, employees are more connected and more mobile than ever. The hybrid workplace is here to stay, and for employees, this means relying on connected devices…
In this day and age, employees are more connected and more mobile than ever. The hybrid workplace is here to stay, and for employees, this means relying on connected devices…
What is Amazon Sidewalk? If you have an Amazon Echo smart speaker or Ring home security device, a new feature called Sidewalk will be introduced on June 8th. According to…
On May 12, 2021, President Joe Biden signed an executive order to bolster the nation’s cyber security efforts. This order comes days after the significant ransomware attack on the Colonial…
By now, you’ve probably heard about the major data breach that involved millions of Facebook user accounts. As one of the most popular social media platforms, you may be wondering…
The notable rise in unemployment last year has put some in our local region at risk after a data breach at the Vermont Department of Labor (VDOL). The mix-up resulted…
Earlier this month, more than 3.2 billion unique unencrypted email and password combinations were released on a popular hacking forum. This COMB, or Compilation of Many Breaches, contains data from…
What is a WISP? A Written Information Security Policy, or WISP, details policies and procedures for protecting your company’s confidential data, assessing how it’s being protected, and identifying who is…
A Virtual Chief Information Officer (vCIO) is an outsourced technology pro. A vCIO’s services are available at a fraction of the cost of an in-house CIO and transcend traditional IT…
As we bid farewell to the chaotic and unpredictable year that was 2020, now is the perfect time to ensure your cyber security practices are up to par. These 5…
It’s the most wonderful time of the year! Cookies are baking, snow is falling, and there’s a hint of magic in the air. There’s also a mad frenzy to try…