Search
Close this search box.

Cyber Threats

What Is Identity and Access Management (IAM): Complete Guide

With our modern-day hyper-connected world, the old “castle-and-moat” approach to security just doesn’t cut it anymore. Cloud services, remote work, and interconnected systems have become the norm, making the traditional network perimeter practically non-existent.  Identity is now your new security perimeter, and identity and access management (IAM) is your first line of defense. IAM is […]

What Is Identity and Access Management (IAM): Complete Guide Read More »

Disaster Recovery as a Service (DRaaS): What It Is & How It Works

Your business data isn’t just an asset—it’s the lifeblood of your operations. However, it’s under attack. Cybercriminals know how valuable it is, and they either want it for themselves or want to sell it back to you (aka, ransom).  Fortunately, you’re not at their whim. With Disaster Recovery as a Service (DRaaS), you can keep

Disaster Recovery as a Service (DRaaS): What It Is & How It Works Read More »

Types of Hackers

What are Hackers? Hackers, individuals with advanced computer skills, gain access to systems, networks, or data. Despite diverse personas, often associated with malicious intent, the hacker landscape features intricate classifications. Ethical defenders fortify digital defenses, while shadowy architects exploit vulnerabilities, mirroring the complexity of the digital landscape. Types of Hackers Red Hat Hackers: Ethical Guardians

Types of Hackers Read More »

E-Greetings or E-Threats? The Era of Holiday E-Cards

E-Greetings or E-Threats? It’s the holiday season! This means sweet treats, lights and ornaments, and holiday cards with well wishes. Unless you’ve been living under a rock, sending and receiving holiday greetings has evolved from traditional paper cards to e-cards. E-Cards have become increasingly popular due to their eco-friendly nature, cost-effectiveness, and the ability to

E-Greetings or E-Threats? The Era of Holiday E-Cards Read More »

Fayon Atkinson from Corvus Insurance on podcast discussing voice and text phishing

Podcast: Voice and Text Phishing

 Episode Summary What are vishing and smishing? Simplified, vishing is voice phishing and smishing is text phishing. Phishing is when scammers or attackers attempt to trick users into revealing sensitive information, sending money, or installing malware. So how does this affect your business? Art Ocain and Fayon Atkinson from Corvus Insurance discuss some common

Podcast: Voice and Text Phishing Read More »

man using airiam rmm tool

Internal Penetration Testing and Small Businesses

Internal Penetration Testing What is Internal Penetration Testing? You may be thinking, “What even is an internal penetration test?” There is just something wrong about the phrase when you say it. The way it rolls off the tongue is just odd. Internal penetration testing is the act of mimicking a hacker to break into your

Internal Penetration Testing and Small Businesses Read More »