Business Email Compromise (BEC): The $26 Billion Scam

Business Email Compromise

Dubbed by the FBI as the $26 billion scam, Business Email Compromise (BEC) attacks come with an average cost of $5.01 million per breach according to the 2021 IMB Cost of Data Breach Report. Do you have that type of capital to mitigate the costs of such a breach?

Cybersecurity Do’s and Don’ts

cybersecurity do's and don'ts

According to the Cybersecurity and Infrastructure Security Agency (CISA), “cyber actors routinely exploit poor security configurations (either misconfigured or left unsecured), weak controls, and other poor cyber hygiene practices to gain initial access to compromise a victim’s system.”

Tax Season Cybersecurity Tips

Tax Season

Tax season is coming to an end. While you were searching high and low for your tax documents, cybercriminals were likely scouring the internet to find your private information. In 2021, there were more than 1.4 million reports of identity theft across the country. With tax-related identity theft being the most common form during tax […]

3 Ways to Recruit Top IT Talent

3 Ways to Recruit Top IT Talent

An organization lives or dies based upon the people that work within it. If your organization is filled with high-performing and competent individuals, you will offer a higher quality service or product to your customers.

Potential Threat of US Cyber Attack

Potential Threat of US Cyber Attack

You may be wondering what the current state of cybersecurity looks like for the US. On March 21, 2022, The White House warned US businesses to “harden cyber defenses immediately”.

Why you should use an IT staffing agency

Why you should use an IT staffing agency

There are too many stories of new hires bringing productivity down, ruining company culture, or simply leaving after the initial investment of onboarding them. That’s where working with a good IT staffing agency comes in.

Log4j Vulnerability Explained by a Cybersecurity Expert

Log4j

The Log4j vulnerability has been described as “the single biggest, most critical vulnerability of the last decade”. This vulnerability is impacting everyone on the internet from financial institutions to government entities.

Shields Up: Preparing for Cyber Attacks

Shields Up

The Cybersecurity and Infrastructure Security Agency (CISA) and the Department of Homeland Security (DHS) have issued warnings that “every organization in the US is at risk from cyber threats.”

Personal Cybersecurity News: Apple AirTags

Apple Airtags

Cybersecurity is not all about business and government regulations. Hacking and bad actors can directly impact individuals. Experts are warning of the use of Apple AirTags for stalking and other malicious activities.

Play Video