security best practice

Incident Response Planning

Your Incident Response Plan – Part 1: Preparation

Creating an incident response plan can help us navigate cybersecurity events outside of the office. A good plan will focus on five key areas; Preparation, Detection, Response, Recovery and Learning. In part one of this three-part series, we discuss the preparation stage of an incident response plan to help lay the foundation of a successful …

Your Incident Response Plan – Part 1: Preparation Read More »

Puppet Image

What is Social Engineering?

Why are cyber scams so effective? It comes down to social engineering tactics that successful cybercriminals have mastered. In this week’s security tip video, learn some common social engineering tactics used by cybercriminals and some of the red flags you should look out for.

Romance Scams

Love is in the air! Especially when it comes to cybercriminals, who love to use their romance scams to lure in their victims.  In this week’s security tip video, learn about some romance scam red flags and how to help protect you or a loved one. A common sign of a Catfish is someone who avoids video …

Romance Scams Read More »