Creating Your Incident Response Plan 

In a previous article we wrote about the activities and information required to create an effective incident response plan. In this article we will talk…

Avoid Becoming a Victim of Social Engineering

In any conversation regarding cybersecurity, the topic ultimately turns to phishing and the social engineering tactics that make this the most effective strategy for cybercriminals…

Why Collaboration Data Needs to be Backed Up

In today’s business environment, the majority of collaboration content is acted upon and stored electronically in Software as a Service (SaaS) applications such as M365….