CBM Technology Named Top 250 Managed Security Services Providers
Of all the recognitions, being acknowledged as one of the top 250 Managed Security Service Providers 2 years in a row is probably one of the items that I am most excited about. CBM [...]
What is SOC 2 Type 2?
What is SOC 2? Service Organization Control (SOC) – created by the American Institute of Certified Public Accountants (AICPA) [...]
DHS announced that hackers are targeting IT Service Providers
US Department of Homeland Security made a security announcement that hackers are targeting IT service providers to gain access [...]
Faxploit – What should you know about it?
Some of us think of fax machines as a relic, but fields like healthcare and government still rely on [...]
What’s the biggest risk to your business?
Valuable infographs. While reviewing the Verizon 2018 Data Breach Investigations Report, there was some very interesting info graphs [...]
5 Tips for protecting your network from cyber security threats
Today and probably forever, business owners and management like yourselves should focus on protecting their company from sophisticated cyber adversaries. [...]
Security Alert – Expect increase in phishing attempts due to a large data leak.
Exactis, a marketing firm, left their databases exposed to the public that contained around 340 million records. These records included [...]
What is phishing?
Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone [...]
How to protect yourself from phishing attempts?
Common Indicators of phishing attempts Suspicious sender’s address. The sender's address may imitate a legitimate business. Cybercriminals often use [...]