Our Blog
How to Protect Yourself from Common AI Scams
Generative AI is making a lot of common tasks easier, but it’s also making common scams easier by giving criminals the tools to create convincing fake messages, images, and even videos. Fortunately, there are some simple steps you can take to...
Reducing Risk Through Continuous Compliance
The compliance burden on organizations is growing. The average cost of a security breach hit $4.88 million in 2024. Governments worldwide continue to draft new measures to protect the privacy of user data and wrangle the beast that is artificial...
AI Vishing: What It Is and How to Protect Yourself
As I discussed in an earlier blog post, AI technologies show promise for improving productivity, but they can also be utilized by bad actors. A frequently-cited example is the story of a couple who were scammed by a criminal using voice-cloning...
Cost-Conscious Strategies for Securing Your Small Business
There is a common misconception that cyber criminals only go after large organizations, but smaller companies have become attractive targets. According to the US Cybersecurity and Infrastructure Security Agency (CISA), small businesses are three...
Manual versus Automated Penetration Testing
In the ever-evolving landscape of cybersecurity, security-minded organizations look for the most effective methods to protect their systems and data from cyberthreats. Penetration testing, meaning an authorized, simulated penetration of a computer...
What CSPs Need to Know Before Starting a FedRAMP Authorization
The transition of US government agencies to the cloud is an exciting opportunity for Cloud Service Providers (CSPs). Yet before CSPs can take advantage of that opportunity, they must be authorized via the Federal Risk and Authorization Management...
Beyond the Defaults: Securing Your Microsoft 365 Environment
The Microsoft 365 suite of tools provides productivity benefits to many organizations. However, the default settings of Microsoft 365 when implemented out of the box may not be secure enough for your organization. This can leave your organization...
Four common AI myths and the security risks of believing them
AI tools are being deployed by IT departments around the world, and many organizations are reaping immediate benefits. However, there are many myths and misconceptions surrounding AI, and believing them can lead to security risks. Here are four...
Introduction to AI and Potential Security Concerns
The rapid rise of powerful, breakthrough AI technologies like ChatGPT has generated a lot of excitement in the IT world, but also concerns about threats to security and privacy. Some tech leaders have even publicly voiced concern that AI poses a...
What you need to know about AI Compliance
Download eBook: Preparing for AI Compliance AI technologies are being deployed by organizations at one of the fastest rates we’ve ever seen, and in response, regulatory and standards bodies are working to implement new compliance obligations that...
How to Protect Your Business from Ransomware
Ransomware can severely impact your business if you are not prepared. In recent months, a ransomware attack forced a group of 30 hospitals to divert patients from emergency rooms to other hospitals, while another forced a large financial...
Get In Touch Today