Phishing Emails Are Getting Smarter – Are You?

Phishing Emails Are Getting Smarter - Are You Blog Graphic with fish hook and padlock to promote security awareness training

We’re all aware of the threat of phishing attacks. It’s sometimes assumed that technical minded people are invincible to phishing attacks, but even the most savvy can be duped. The latest phishing attack making headlines has a 90% success rate. You may be familiar with the standard phishing language below, but what about non-traditional methods? Standard Phishing Language:…

Read More

5 Ways to Spot Phishing Emails

How to spot phishing emails

Scam artists – sneaky, deceitful, intentional – whether it’s someone on the street, the phone or online. We’ve all been exposed, or worst have been a victim of a scam. Today, modern pickpocketers have carefully orchestrated phishing emails designed to manipulate and target people’s instincts. That leaves us to be educated on how to spot…

Read More

Password Fails.

Password Fails

Ah, passwords. The annoying gate to access every digital account. And since it’s 2021 and everything is online – the accounts and passwords add up. Just like we pay taxes and wear seatbelts, it feels as if we need to make an account just to do simple browsing. Nonetheless, passwords are a necessary evil of…

Read More

Understanding Risk-based Vulnerability Management

Understanding Risk-based Vulnerability Management

Devices, tools and users are constantly being added to your network and widening the attack surface.  Every new addition adds another possibility for misconfiguration and vulnerabilities. The longer a vulnerability goes undetected, the greater the risk. Sound familiar? Security teams across industries all live this reality every day. That’s where risk-based vulnerability management can help.…

Read More

5 Projects Missed at IACP: Guide to 2022 Technology Projects

5 Projects Missed at IACP: Guide to 2022 Technology Projects

You shouldn’t miss out on the current technology trends for law enforcement and public safety agencies even with the annual IACP conference canceled. Technology continues to find its place in departments to aid in investigations and make day-to-day operations easier. So, we’re here to share 5 projects for your department that we know many were…

Read More

3 Keys to a Successful Zero Trust Journey

The Guide to Planning a Zero Trust Strategy

You can’t buy zero trust. We said that in part one and stand by that statement. While you can buy solutions to enforce zero trust, the designing of a successful zero trust architecture is left up to the security teams. And we want to set your team up for a successful zero trust journey with…

Read More

How to Create a Zero Trust Architecture

If you’ve made it to part three of our zero trust series, then congratulations you’ve uncovered what zero trust is and have planned your zero trust strategy. With those steps completed, it is time to get to work on how to create a zero trust architecture. Unfortunately, since every organization has its own environment and…

Read More

The Guide to Planning a Zero Trust Strategy

“Never trust, always verify” is the zero trust concept and modern-day approach to combatting cyberattacks. In part one of our zero trust series, we uncovered the what and why of zero trust. Naturally, it is time to dive into the how and learn the four steps to planning a zero trust strategy. Since zero trust…

Read More

What is Zero Trust, Actually?

||

There are three guarantees in cybersecurity: ransomware attacks, changing perimeters and new buzzwords. For the last decade, zero trust has been the buzzword of what every security team, tool, approach and framework should be achieving. Now in 2021, we’re seeing an onslaught of ransomware, work environments still in flux with Forrester, NIST and everyone in-between…

Read More

Why is Disaster Recovery Important?

Why is Disaster Recovery important||Why is Disaster Recovery important|Why is Disaster Recovery important

Disasters, whether natural or cyber-related, are inherently unpredictable and can wreak havoc on businesses and IT infrastructure alike. While we don’t have much construction experience, we can certainly help the recovery process by sharing our tips and insight to answer the question: Why is disaster recovery important (and why every company needs it). What is…

Read More