Should Your Company Have a Tabletop Exercise?
Let’s think about a scenario – hackers accessed your network and deployed ransomware. Or there was a crazy weather event and now your main location is non-functional. Is your team prepared if something were to happen? Do they know where those procedures are, what to do, what questions to ask.
When Do You Need Security Awareness Training?
Security awareness training is a critical component of any organization's security strategy. It involves training employees on common security risks and how to recognize and avoid them. This includes identifying phishing emails, scam calls, and text messages, as well as learning how to follow electronic funds transfer procedures and more!
What Not To Do When You’ve Been Hacked
Ok, you got hacked, now what? Ok, first of all, got a cyber response plan? Use it. If you don't? Then if you have cyber insurance, contact your insurance people. If you're not sure, contact your IT support folks. But don't start "fixing the problem”.
How Often Should My Data Be Backed Up?
Backing up data is a critical process for any business to ensure the continuity of its operations in the event of a disaster. The frequency of backups, however, depends on several factors that are unique to each organization.
How Could Hackers Use AI?
At the end of 2022 artificial intelligence entered the mainstream with tools like ChatGPT, DALL E, and more, becoming wildly popular. As with any tool, they can be a powerful force for positive change in the world, but in the wrong hands they could cause harm. So how is AI technology empowering hackers?
Is Your CEO Really Texting You?
In today’s fast-paced work environment, it’s not uncommon to receive messages and emails from colleagues and superiors requesting assistance or information. However, with the rise of cyber threats, it’s important to take a moment to pause and think before reacting to these messages, especially when they involve financial transactions or sensitive information.
New Microsoft Outlook Vulnerability
Attention all Microsoft Outlook users! A new vulnerability has been revealed, and it's a pretty scary one. Essentially, a malicious entity can send an email to a user without any action on their part, and potentially obtain their password. Considering how much sensitive information is shared via email, this is a major concern.
Don’t Let Scammers Take Advantge During a Crisis
In recent times, we have witnessed a significant banking collapse, including the downfall of Silicon Valley Bank, which has created chaos and confusion in the financial industry. As businesses and individuals attempt to navigate this unprecedented situation, it is essential to remember that scammers often take advantage of such events.
Right Of Boom Security Conference 2023
Recently, I had the opportunity to attend the Right Of Boom security conference down in Dallas. This conference is focused on the defensive operations that managed service providers should be taking in order to respond to the ever evolving threat landscape. I left this conference with a ton of ideas to increase the security posture for our clients, but also to be better prepared in the event of a security incident.
Zero Trust World Conference 2023
Recently I had the opportunity to attend Zero Trust World in Orlando. This was an excellent security centric conference for Managed Service Providers. The focus of this conference was on defensive security practices, including the concept of Zero Trust. Over the course of two days, we had the opportunity to see some of the offensive tradecraft used by attackers and methods defenders can use to protect their environments.
Legacy Operating Systems and Compliance Mandates
We’re going to take a moment to talk about legacy operating systems and compliance frameworks. Before we get into the technical details, let’s define what we mean by a legacy operating system. A legacy operating system is defined as a platform that is no longer used due to the availability of newer or updated versions.
IT Nation Learning Experiences
IT Nation Connect just wrapped up in Orlando. Normally I try to stick to the security focused conferences in the MSP space. This time around I wanted to take a step back to take a pulse on where Simplex-IT is at on the industry level as well as to look for ways to increase the value to our clients, especially around our security offerings.
Why Do I Still Get Spam if I Have a Spam Folder?
The simple answer is that computers aren't perfect. The bad guys are using low-tech emails from using common email addresses from a legit email provider like Gmail or Yahoo.
IT Nation Secure Conference Recap
This past month our Technical Director Kevin Dutkiewicz and our Security Tsar Adam Evans went down to Orlando for the IT Nation Secure conference presented by ConnectWise. This conference focuses on cybersecurity in our slice of the technology world. We’ve asked them to share some of the fun and talk about what they took away from the event.
Quick Recap of Zero Trust World (#zerotrustworld)
Zero Trust World was an excellent conference and it’s been great getting back out there with peers in the industry after 2 years of virtual conference.
I had a chance to catch up with some of our amazing partners (looking at you Liongard and CompTIA) but also got to meet plenty of new folks. I’m excited to spend more time looking into their solutions later this year.