Lessons From Teaching Cybersecurity: Week 9

As I had mentioned previously, this year, I’m going back to school. Not to take classes, but to teach a course at my alma mater, Fanshawe College. I did this about a ...

Best practices for third-party vendor access

Enterprises should be aware that vendors and employees need to have very different logins and credentials. It’s imperative that businesses have much more granular control over remote vendor access to their networks ...

Seven reasons why businesses get hacked

It's not a matter of if your company will be hacked - but when. Planning and ongoing preparation is the ultimate protection against cyber-attacks. Our guest blogger and cybersecurity expert, Marco Essomba, ...

80% of hacking-related breaches leverage compromised credentials

We first wrote this blog in 2017 and we talked about The 2017 Verizon Data Breach Report that cited 81% of hacking-related breaches leveraged either stolen and/or weak passwords. Today, with the ...

Can you afford a third-party data breach?

In a year filled with data breaches, cyber-attacks, and unauthorized access, yet another company has been the victim of hackers targeting payment information. Have you considered the consequences of becoming susceptible to ...

Employee Remote Access Threats vs. Vendor Access Threats

The last decade saw a dramatic increase of enterprise employees leaving the confines of the company building to work remotely. The State of the Remote Job Marketplace report from FlexJobs found 2.9% ...

How vendors can navigate the challenges of remote support

A recent SecureLink survey found that for every technology vendor there are 239 customers who rely on their support. That’s a lot of people depending on your services – many of which ...

Four steps to prevent the next third-party data breach

Way back in 2018, the Department of Defense (DOD) reported a data breach that affected at least 30,000 military and civilian personnel. Let’s take a stroll down memory lane to look at what ...