Creating Your Incident Response Plan 

In a previous article we wrote about the activities and information required to create an effective incident response plan. In this article we will talk…

Patch Management Best Practices

Right up there with human error, unpatched systems are one of the top causes of data breaches. According to the Ponemon Institute, over 57% of…

Classic Phishing Scam

Phishing’s origins have been traced back to 1995. That’s when a group of hackers devised several schemes to steal money and sensitive information from America…

What is Windows 365?

The pandemic has changed the way many companies operate. One notable development is an increase in the number of businesses adopting a hybrid work model….