What Should You Know About the Chinese Telecom Hack?
Chinese hackers appear to have broken into eight US telecom companies' networks with the primary goal of spying on …
Email Retention Policy Best Practices
Does your business need an email retention policy? If you’re in finance, healthcare, government, or any other heavi…
What Is Social Engineering, and How Is It Used in Cybersecurity Attacks?
Social engineering sounds nice, and in some contexts, it is. Social engineering can mean shaping the development an…
The Importance of Security Awareness Training
Let’s face it — generally speaking, human beings aren’t naturally very good at adopting secure habits. 34% of home …
Security Awareness Training 101
Your average cybercriminal does not need to be a mastermind to pull off a successful attack. Tools exist to do much…
Do You Really Need a CISO?
It’s no secret that cybercrime has been escalating dramatically since 2020. Worse yet, small to medium-sized busine…
Cloud-Based Video Surveillance: Myth vs. Fact
I love that television shows have featured modern video surveillance systems in their plot lines! I actually wish e…
A Complete Guide to Business Cybersecurity Insurance Questionnaires
With the average cost of a data breach at an all-time high — $4.88 million — it makes sense that more organizations…
What Should You Know Before Implementing AI Tools?
Throughout history, we often see that good ideas and innovation often take time to gain a foothold. However, this r…