Cybersecurity Awareness Training

A keyboard key labeled "Phishing" is hooked by a fishing hook, with an email symbol in the background, illustrating the concept of phishing attacks and highlighting the signs of phishing.

Signs an Email is Phishing: 5 Signs of Phishing in Your Inbox

For years we’ve read articles teaching us to identify the signs an email is phishing. We all know the signs, yet we still miss the blatant indicators and take the…

Read More
Wooden letter tiles spell out "ZERO TRUST SECURITY" against a blue background, with the "O" in "ZERO" strikingly highlighted in red.

A Personal Twist on Zero Trust Security

The massive Australian data breach in late September inspires me to share a personal twist on Zero Trust Security. What makes this incident colossal? BBC News Australia reports, “Australian telecommunications…

Read More
Abstract digital circuitry design against a deep blue background, with interconnected lines and points representing a technological network.

What is a Pretexting Attack?

Pretextingis form of social engineering in which an attacker tries to convince a victim to give up valuable information or access to a service or system. The distinguishing feature of this kind…

Read More
A person inserts a USB flash drive into a laptop on a dark table, with one hand on the keyboard and the other holding the flash drive.

What is a Baiting Attack?

What is baiting? It is one of the simplest social engineering techniques since all that it involves is an external storage device. An attacker will leave a malware-infected external storage…

Read More

10 Best Practices from the Top Cybersecurity Training Companies

Why would an MSP publish an article sharing ten best practices from the top cybersecurity training companies? Because we partner with most of the computer-based educational providers quoted in this…

Read More

The 5 Best IT Projects to Prevent 80% of Cyber Threats

The Center for Internet Security or “CIS” has five controls for IT projects that will prevent 80% of today’s cyber threats. These critical security controls or recommendations provide an objective,…

Read More
cybersecurity best practices for law firms

How to Fix 13 Common IT Problems on Small Law Firm Networks

Are you ready to identify and fix 13 common IT problems frequently found on law firm networks? This nine-minute article will give you ideas you can implement right away.

Read More