Business Email Scams, Whats the Cost?

Business Email Scams, Whats the Cost?

What is a Business Email Compromise Attack? Business email compromises are when an attacker impersonates the real owner of an email account to defraud the company, its customers, partners, or employees into sending money or sensitive data to the attacker How Does It...
Do you need Cybersecurity Insurance?

Do you need Cybersecurity Insurance?

Emerging trends Recent surveys show that nearly 50% of companies have cyber insurance policies, up considerably from just a few years ago. While insurance is nice to have there is no replacement for a proper cybersecurity program. Attacks are becoming more and more...
7 Essential Tips to Combat Ransomware

7 Essential Tips to Combat Ransomware

 A record-setting Year      According to cybersecurity experts, there were two pandemics last year, one was COVID-19 and the other was cyber fraud. The FBI Internet Crime Complaint Center reported that in 2020 alone, there were more than 790,000 complaints about...
How to bypass Office 365’s 90 day log limit

How to bypass Office 365’s 90 day log limit

How to bypass Office 365’s 90-day log limit When responding to an O365(office 365) data breach, depending on how quickly the breach was discovered, you may need to go further back than the 90 days that are allowed by default. Usually, you need an E5 or similar license...
Why use a Managed Security Provider?

Why use a Managed Security Provider?

Emerging Threats Cybercrime costs have increased by over 400% in the past two years. Hardly a week goes by without news of another data breach, ransomware attack, or cyber attack making front-page news. Analysts predict that attacks will continue to increase in...