7 Common Password Mistakes to Avoid (and Their Solutions)

7 Common Password Mistakes to Avoid (and Their Solutions)

According to the Verizon 2021 Data Breach Investigations Report, credentials are the #1 way that a cybercriminal hack into an organization, with 61% of breaches attributed to leveraged credentials. That means that by way of clone phishing, domain spoofing or one of...
How to Protect Smartphones from Cyber Threats

How to Protect Smartphones from Cyber Threats

Not that long ago, you would be happy if your mobile phone had enough memory to store 100 contacts, and you would be ecstatic if it could also store the same number of text messages. Today, your smartphone can not only store a virtually infinite number of contacts and...
New phishing method discovered: Consent Phishing

New phishing method discovered: Consent Phishing

A new phishing method has recently been identified and is now on the rise. And because of its well-crafted mimicking abilities, it’s hitting small business end users at an increasing rate. Consent phishing is a new technique that attackers are using in response to the...
Tips on Cybersecurity Employee Training

Tips on Cybersecurity Employee Training

Of all the cybersecurity tools, tricks, software, and processes, none is more important than employee training. It must always be at the heart of your cybersecurity plan. That’s because no amount of cutting-edge technology can protect you from the one thing that is...