7 Essential Tips to Combat Ransomware

7 Essential Tips to Combat Ransomware

 A record-setting Year      According to cybersecurity experts, there were two pandemics last year, one was COVID-19 and the other was cyber fraud. The FBI Internet Crime Complaint Center reported that in 2020 alone, there were more than 790,000 complaints about...
How to bypass Office 365’s 90 day log limit

How to bypass Office 365’s 90 day log limit

How to bypass Office 365’s 90-day log limit When responding to an O365(office 365) data breach, depending on how quickly the breach was discovered, you may need to go further back than the 90 days that are allowed by default. Usually, you need an E5 or similar license...
Why use a Managed Security Provider?

Why use a Managed Security Provider?

Emerging Threats Cybercrime costs have increased by over 400% in the past two years. Hardly a week goes by without news of another data breach, ransomware attack, or cyber attack making front-page news. Analysts predict that attacks will continue to increase in...
Why use a Password Manager?

Why use a Password Manager?

Why Use a Password Manager? I bet you use the same password across multiple websites, am I right? If you ask people if they like passwords most will say No. However, if you ask people if they like their password manager, many will say, yes. Security experts recommend...
Have your passwords been leaked?

Have your passwords been leaked?

Data breaches happen more often than we know. Your passwords to different websites are often stolen and available to hackers on the internet. There is a website that lets you check this; it is called Have I Been Pwned. It lets you check whether your personal data has...