Cyber Security is critical for any business, but the technology is complex and fastmoving. Since understanding your security posture is so important and so difficult for business leaders, we created this bookmarkable guide for you to refer back to.
It’s estimated that 3.4 billion phishing emails are sent each day worldwide and that 91% of all successful data breaches begin with a spear phishing attack. Information Technology professionals agree that end users are the weak link in cyber security defenses. Security awareness training helps shore up your defenses by teaching users how to spot
Anti-Virus Service Ending July 1, 2023 Since 2013, Endpoint Detection and Response (EDR) has been gaining popularity as a means of protecting against viruses and other cyberattacks. MTSi has been transitioning customers from anti-virus to EDR over the last few years and in July 2023, will no longer be providing anti-virus service. Why discontinue anti-virus?
We recently held a Cyber Insurance and Cyber Security webinar and had an opportunity to speak with Lewis Pope, a Head Nerd at N-able. N-able is a leading provider of network management systems and tools and a key partner for MTSi. One of the key points Lewis made was about the importance of a centralized
What do BCC, Swansea Public Schools and Nantucket Public Schools Have in Common? Each of these schools was shuttered in separate ransomware attacks in the thirty-eight days from December 23 to January 31. The Bristol Community College attack on December 23 was the worst, keeping the systems down at the school for a week. The
Your Cyber Insurance Carrier Wants You to Hire An MSP. And you should. IT Security Starts with the Basics The experts inside your insurance company and experienced IT professionals agree that many of the most important things protecting your data from cyberattack are maintenance practices that are followed with discipline. As professionals, we often see
What is Multi-Factor Authentication (MFA)? Multi-Factor Authentication (MFA) is a way to validate that a user who is requesting access to a resource is not an imposter. MFA works by asking for more information from a user when they make a request. This could be something they know (a pin or secret like their mother’s
Are You Subject to the FTC Safeguards Rule? The FTC Safeguards Rule requires business to take certain precautions to protect customer data. The requirements are for financial institutions, but the FTC Safeguards Rule has a much broader definition of what is considered a financial institution than what you and I think about as a bank.
Why Anti-Virus Isn’t Enough to Protect You from Advanced Cyber Threats And Why Organizations Are Turning to Endpoint Detection & Response
Cybersecurity has become one of the most important aspects of protecting your business. With data breaches and ransomware becoming more common, it’s essential to have a plan in place to protect yourself from these threats. Unfortunately, anti-virus software isn’t enough to protect a company’s network anymore. Q1 of 2022 witnessed a 14% increase in data
Ransomware attacks can devastate businesses of any size, so it’s critical to be aware of the dangers they pose. Ransomware is a type of malware that encrypts files on a victim’s computer, followed by a hacker demanding a ransom payment in order for them to be decrypted. The threat landscape is changing rapidly, and ransomware