When burglars case a house to burgle, they look for easy access. Unlocked doors and open windows are the most common entry points into homes. Cybercriminals also use common entry points to hack into your clients’ networks. What are the most vulnerable points cybercriminals target?...

The Health Insurance Portability and Accountability Act (HIPAA) Security Rule that protects electronic data went into effect in 2005, but small and midsize healthcare organizations are still struggling to comply with the law. They are confused and fear the Security Rule because they don’t have the...

Battling cybercrime is an ongoing effort for every organization. It requires vigilance and attention to detail to maintain defenses against enemies looking to exploit every chink in the armor to penetrate corporate networks and do bad things.  SMBs are particularly susceptible to cybercrime because of their limited...

Most organizations with Microsoft 365 operate in hybrid environments with a combination of cloud and on-premises applications. While MSPs are generally on solid ground when it comes to the on-premises component, many need more visibility into, and control over, the virtual component.   MSPs can scope...

After an incredibly damaging and costly run of high-profile cybercrime, many businesses may be relieved to learn they can purchase some protection in the form of Cyber Risk Insurance. With so many companies having their data held hostage, who wouldn’t be a little scared that...