For many companies, it would be a nightmare to discover that they are the latest unwitting victim of a ransomware attack, capable of crippling computer systems and locking up data if a payment isn’t made to cybercriminals. There’s no magic wand that can make a ransomware attack simply disappear – with no impact at all

Read More

In this day and age, there is a tool for everything. Taxes, budgeting, dieting, all of these have tools. Some tools are so ubiquitous in our lives, that we cannot imagine life without it. Cybersecurity is no exception – there are tools for every need: from firewalls to antivirus and reporting to automation. When it

Read More

What Is the CMMC?The Cybersecurity Maturity Model Certification (CMMC) is a new cybersecurity framework and accompanying certification that is in the process of being finalized by the US Department of Defense (DoD). Soon, any contracts offered by the DoD will specify a level of the CMMC required to be awarded the contract. While the CMMC framework

Read More

Welcome to the second part of the series on Cybersecurity: The Human Factor. In Part 1 we talked about the fact that attackers are constantly considering the human factor when developing and executing attacks. In this part we are going to examine the human factor from the defender’s perspective and explain why this creates a more

Read More

No matter how much the threat landscape changes, there is one constant that will always stay the same: the people. When you hear about hackers or nation state actors, they are portrayed as either technical wizards doing things that no normal human can or as mysterious shadowy figures like those in fireside tales about the

Read More