What exactly is Mobile Device Management (MDM)?

What exactly is Mobile Device Management (MDM)?

What exactly is Mobile Device Management (MDM)? In many organizations, employees have mobile devices that they use to do their jobs.  Those mobile devices can be tablets, smartphones, or other devices.  To be able to manage these devices, organizations often will use...
Business Email Scams, Whats the Cost?

Business Email Scams, Whats the Cost?

What is a Business Email Compromise Attack? Business email compromises are when an attacker impersonates the real owner of an email account to defraud the company, its customers, partners, or employees into sending money or sensitive data to the attacker How Does It...
Do you need Cybersecurity Insurance?

Do you need Cybersecurity Insurance?

Emerging trends Recent surveys show that nearly 50% of companies have cyber insurance policies, up considerably from just a few years ago. While insurance is nice to have there is no replacement for a proper cybersecurity program. Attacks are becoming more and more...
7 Essential Tips to Combat Ransomware

7 Essential Tips to Combat Ransomware

 A record-setting Year      According to cybersecurity experts, there were two pandemics last year, one was COVID-19 and the other was cyber fraud. The FBI Internet Crime Complaint Center reported that in 2020 alone, there were more than 790,000 complaints about...
How to bypass Office 365’s 90 day log limit

How to bypass Office 365’s 90 day log limit

How to bypass Office 365’s 90-day log limit When responding to an O365(office 365) data breach, depending on how quickly the breach was discovered, you may need to go further back than the 90 days that are allowed by default. Usually, you need an E5 or similar license...