Webinars   

Webinar: Finding Clarity in the Cloud

By Michelle Drolet . 13 Feb 2020

Cloud security is simpler than you think. Move to the cloud with confidence while increasing the efficiency of your security management, compliance, and governance. Listen in to learn how you can: Secure once and run everywhere: manage a multi-layered security strategy across your data center and cloud from a single console. Secure every cloud and … Continue reading Webinar: Finding Clarity in the Cloud

Webinars   

Webinar: Humans are the new Malware

By Michelle Drolet . 13 Feb 2020

It may seem like a peculiar twist of irony, but as the technical capabilities afforded by automation proliferate, successful cyberattacks are increasingly more reliant on human execution. Join this 60-minute presentation to learn more about the cyber threat landscape, threat hunting and response techniques, and real-world examples of how Sophos Managed Threat Response detects and … Continue reading Webinar: Humans are the new Malware

10 Best Practices for Securing Your Cannabis Business in 2020

By Michelle Drolet . 5 Feb 2020

The risk of a data breach is ever-present and can prove disastrous especially for cash-based businesses like cannabis. It’s vital to guard against cyber-attacks, but also to establish solid plans to ensure you react to any breach in the right way. It has never been easier for cybercriminals to infect your business with malware or … Continue reading 10 Best Practices for Securing Your Cannabis Business in 2020

Michelle Drolet Recently Interviewed by Superb Crew

By Michelle Drolet . 5 Feb 2020

Our CEO, Michelle Drolet recently sat down with Superb Crew to discuss industry trends, threats and how to stay ahead. Link to the full interview below Q: What are you most excited about in the industry at the moment and what future trends are you expecting to see? A: We see more business coming to … Continue reading Michelle Drolet Recently Interviewed by Superb Crew

10 Things I Know About … Email scams

By Michelle Drolet . 5 Feb 2020

10. Nigerian prince lives. The royalty who wants to send you money is the oldest scam in the book, yet it continues to lure victims. Phishing works by creating false trust to give up log-in credentials, click a bogus URL or download a malware-infected file. 9. Avoid pain. Be aware successful phishing scams can result … Continue reading 10 Things I Know About … Email scams

Protect Yourself From Ad Threats And ‘Malvertising’

By Michelle Drolet . 3 Feb 2020

Record numbers for internet sales were reported in 2019, but online retailers aren’t the only ones laughing all the way to the bank. Cybercrime costs retailers a staggering $30 billion a year, and the sector is among the top ones targeted globally. Last year, three quarters of global retailers reported falling victim to cyberattacks. A New Attack Method Emerges: Ad Threats Cyberattackers are … Continue reading Protect Yourself From Ad Threats And ‘Malvertising’

The Evolving Threat Landscape: Five Trends To Expect In 2020 And Beyond

By Michelle Drolet . 14 Jan 2020

2019 is set to break a record for the highest number of security incidents ever recorded and probably the biggest and most expensive year in terms of data breach fines, penalties and court settlements. While large-scale breaches always make big headlines, hackers are not sparing small businesses and consumers. As we head into the new decade, cyberattacks will continue … Continue reading The Evolving Threat Landscape: Five Trends To Expect In 2020 And Beyond

Save the Date: Information Security Summit 2020

By Michelle Drolet . 6 Jan 2020

Click here for more information & to register! Please save the date and plan to join us for this timely forum on what you need to know about the latest security issues, threats, and technologies that will help you protect your business! When Thursday, June 4, 2020 8:00AM – 1:30PM MassBay Community College, 50 Oakland Street, … Continue reading Save the Date: Information Security Summit 2020

5 Steps To Develop An Incident Response Plan

By Michelle Drolet . 23 Dec 2019

It’s almost a no-brainer that all organizations, regardless of their size, need some form of cybersecurity. Cybersecurity not only means that you protect your digital assets against a cyberattack, but it also means that you must plan for the inevitable. What if your data is breached or your systems are attacked? Seems pretty obvious, doesn’t … Continue reading 5 Steps To Develop An Incident Response Plan

Cyberattack   

8 common pen testing mistakes and how to avoid them

By Michelle Drolet . 6 Dec 2019

Penetration testing is vital, but are you doing it right? Here are some common mistakes and advice on how to avoid them. One of the most effective ways to uncover flaws and weaknesses in your security posture is to have a third party carry out planned attacks on your system. Penetration testing is all about … Continue reading 8 common pen testing mistakes and how to avoid them

Tags