Social engineering is a manipulation technique used by cybercriminals to trick you into taking a specific action or divulging confidential information without thinking. We’ve previously covered tips on how to spot phishing emails in the workplace by identifying some...
Terms of service, privacy agreements, and other disclaimers often inundate us as we browse the web, sign up for new social media accounts, or download a new app to our phone. With how long and complex these terms of use can be, it is no wonder why many users scroll to...
Cybersecurity is not only a concern for large corporations, but also for small businesses that may be more vulnerable to cyber-attacks. According to Accenture, small businesses accounted for 43% of cyber-attacks in 2019, but only 14% had adequate security measures in...
In our previous newsletter, we discussed the human firewall and the importance each member of an organization plays in keeping its data secure. On-going security training is an important measure to implement as this ensures that staff are up to date on new tactics the...
The battle against cybercriminals and hackers requires constant vigilance. While modern security appliances and software are highly sophisticated, it is important to avoid complacency and reliance solely on these security tools. This is why the human firewall is...
With the flood season upon us, and increased frequency of extreme weather events, there is a greater demand for alerting on the physical environments we work in. The Meraki network can be used for much more than just wireless connectivity and security appliances....