by Heath | Dec 17, 2021 | Security Tips
What exactly is Mobile Device Management (MDM)? In many organizations, employees have mobile devices that they use to do their jobs. Those mobile devices can be tablets, smartphones, or other devices. To be able to manage these devices, organizations often will use...
by Heath | Dec 13, 2021 | Security Tips
What is a Business Email Compromise Attack? Business email compromises are when an attacker impersonates the real owner of an email account to defraud the company, its customers, partners, or employees into sending money or sensitive data to the attacker How Does It...
by Heath | Dec 10, 2021 | Security Tips
Emerging trends Recent surveys show that nearly 50% of companies have cyber insurance policies, up considerably from just a few years ago. While insurance is nice to have there is no replacement for a proper cybersecurity program. Attacks are becoming more and more...
by Heath | Dec 7, 2021 | Security Tips
A record-setting Year According to cybersecurity experts, there were two pandemics last year, one was COVID-19 and the other was cyber fraud. The FBI Internet Crime Complaint Center reported that in 2020 alone, there were more than 790,000 complaints about...
by Heath | Dec 6, 2021 | Techincal
How to bypass Office 365’s 90-day log limit When responding to an O365(office 365) data breach, depending on how quickly the breach was discovered, you may need to go further back than the 90 days that are allowed by default. Usually, you need an E5 or similar license...