Category Archives: cybersecurity

Compliance vs. IT Security: What’s the Difference?

technician-using-laptop-while-analyzing-server

As technology improves, cybersecurity concerns continue to grow. At the same time, government mandates on a national, state, and local level force businesses to restructure their cybersecurity framework to pass various relation requirements. It’s easy to overlook the fact that cybersecurity risks and compliance requirements cannot always be separated. Businesses may try to concentrate on […]

Hybrid Workspaces Are Here to Stay: 6 Things to Do to Keep Your Data Safe

hybrid work space - protect your data

More than ever before, companies are embracing a hybrid workspace model for their employees. A hybrid workspace enables employees to work from a variety of locations, including working from home or other off-site locations. As more and more companies move to a fully integrated hybrid model, challenges will arise for organizations of all sizes. Fortunately, […]

4 Reasons Cybersecurity Attack Surfaces are Expanding for Utah Businesses

Hacker attack

As technology advances, cybercriminals are developing new tactics to take advantage of the vulnerabilities that are created. Cybersecurity attacks are growing in number and becoming more sophisticated. This has caused cybersecurity experts to begin shifting their focus from traditional security measures to creating ways for businesses and individuals to combat the increasing number of attack […]

Cyber Liability Insurance for Beginners

phishing

Cybercrime has risen more than 300% since the beginning of the COVID-19 pandemic1, and with more companies moving to cloud systems and remote working environments that doesn’t look like it will slow down anytime soon.  That’s why you must adopt necessary measures to protect your business from malicious cyber players. One of these measures is […]

Top 5 Small Business Excuses for not Implementing a Cybersecurity Plan

A hacker up to no good

Cyber Security is currently the biggest elephant in the room.  It’s the one everyone knows about, even talks about, but generally believe won’t sit on them.  In my experience companies believe that they are immune to most of the serious breaches because, “We’re too small of a company to be a target.”, “We have a […]

CYBERCRIME UNDERCOVER: PHISHING ATTACKS IMITATING FAMOUS BRANDS PROLIFERATE

phishing attempts

Phishing Attacks Imitating Famous Brands Are Fooling Staffers Into Making Costly Mistakes. Everyone’s hustling a little more these days as we all try to overcome recent challenges — even cybercriminals. An essential part of any cybercrime gang’s hustle is innovation. Bad actors are always looking for fresh ways to get employees to click on and […]

HACKERS LEAKED 22 MILLION RECORDS ON THE DARK WEB IN 2020

hackers targeting your email

Dark Web risk is a constantly growing threat for businesses, and that danger increases every year as more treasure troves of information that bad actors can use to facilitate cyberattacks land on the Dark Web. Experts estimate that hackers dropped over 22 million records on the Dark Web in 2020. Is that information a danger […]

IS THIRD PARTY PASSWORD COMPROMISE YOUR ACHILLES HEEL?

encrypted password

Third Party Password Compromise Risk is Growing It seems like new data breaches are hitting the news constantly. With each successful breach, bad actors don’t just gain valuable company data. They also gain PII and lists of passwords. All of that bounty heads right to the Dark Web, fueling future cyberattacks and increasing your company’s […]