Blog

Phishing vs Spear Phishing: What’s The Difference? (Plain English)

Phishing vs Spear Phishing: What’s The Difference? (Plain English)

Share 0 Tweet 0 Share 0 Everywhere you turn, you are probably hearing about phishing attacks.According to research by KnowBe4, 70% to 90% of breaches today involve phishing.But do you know a phishing method that is highly effective?Spear phishing.Let’s discuss the difference between phishing and spear phishing and how you can protect your business from each.Ready?Before

Read More
Does encryption prevent ransomware

Does encryption prevent ransomware

Share 0 Tweet 0 Share 0 Ransomware attacks have been increasing for the last few years.And there are lots of questions about ways to prevent ransomware.Today, we want to answer one of these:Does encryption prevent ransomware?Can ransomware encrypt an encrypted drive?Even if you have encrypted your hard drives, ransomware can still encrypt (re-encrypt them). Encrypting

Read More
Layered Approach To Security: How To Actually Stop Hackers (in 2020)

Layered Approach To Security: How To Actually Stop Hackers (in 2020)

Share 0 Tweet 0 Share 0 Are you wanting to know how to implement a layered approach to security that will actually protect your company from hackers? One that causes them to be so frustrated that they give up and move on.Then you will love today’s post. Layered security is the only way to actually

Read More
What Is The Principle of Least Privilege?

What Is The Principle of Least Privilege?

Share 0 Tweet 0 Share 0 Do you know one of the most common cybersecurity mistakes small businesses make? Not properly administering access throughout their networks. Everyone gets access to everything – leading to security breaches that leak massive amounts of data. Let’s look at how you can implement the principles of least privilege and

Read More