Security

Incident Response Planning

Your Incident Response Plan – Part 2: Detection and Response

When creating an incident response plan, the detection and response stages are a critical component. It is important to know how to detect when an incident occurs and the appropriate response to help mitigate the damage. In part two of this three-part series, learn some important steps to help detect and respond to security incidents …

Your Incident Response Plan – Part 2: Detection and Response Read More »

Incident Response Planning

Your Incident Response Plan – Part 1: Preparation

Creating an incident response plan can help us navigate cybersecurity events outside of the office. A good plan will focus on five key areas; Preparation, Detection, Response, Recovery and Learning. In part one of this three-part series, we discuss the preparation stage of an incident response plan to help lay the foundation of a successful …

Your Incident Response Plan – Part 1: Preparation Read More »

Romance Scams

Love is in the air! Especially when it comes to cybercriminals, who love to use their romance scams to lure in their victims.  In this week’s security tip video, learn about some romance scam red flags and how to help protect you or a loved one. A common sign of a Catfish is someone who avoids video …

Romance Scams Read More »

Two-step and two-factor authentication: What’s the difference?

Every business should have a strong cybersecurity posture to keep cybercriminals from infiltrating their network. One way to do this is by implementing a strict authentication process using two-step or two-factor authentication. These two processes are so similar that many confuse one with the other. Learn the difference between the two and how you can …

Two-step and two-factor authentication: What’s the difference? Read More »

Here’s why you need a VPN and how to choose one

Installing antivirus software and using strong passwords are no longer considered the bare minimum in cybersecurity. With your online activities transparent to internet service providers, third parties, and hackers alike, it’s important to keep your information secure and private by using a virtual private network (VPN). Here’s why. What is a VPN? A VPN creates …

Here’s why you need a VPN and how to choose one Read More »