Google and Yahoo have both announced that they will require all incoming email to be authenticated with verification and security protocols starting in February 2024. This is a huge endorsement of best practices from two of the largest email service providers, and a critical moment for every organization to set up SPF, DKIM, and DMARC protocols properly and monitor them for compliance.
Blog
Insurers play catch-up on cybersecurity policies
When you next try to renew your cybersecurity insurance, you might find the process for approval and the policies available are quite different from before.
Just Right: How can HVAC give us all our own Goldilocks zone?
Join Berardo Matalucci (Co-founder and CEO at MIMiC) and Noah Landow (Founder and CEO at Macktez) for an informal conversation between a leading technology solutions firm and the founder of an innovative, engineering driven startup reframing heating cooling from a building to a personal scale.
Microsoft finally honors DMARC
Configured properly, and then monitored and adjusted over time, DMARC can reduce cybersecurity risks and increase deliverability for legitimate email. (Configured improperly, however, DMARC instructions could result in all of your outgoing email getting rejected — so you need to know what is going on under the hood.)
Las Vegas ransomware incident highlights need for cybervigilance
A ransomware incident ensnaring two of Las Vegas’s largest casinos made national headlines last month and inspired a lot of questions about ransomware, multi-factor authentication, single-sign on, access management, and vishing. What happened? What went wrong?
Fast, Cheap, and Good: Cases for local storage in an age of cloud
Our first event at our new office was a conversation about the best circumstances for local storage at time when most organizations are moving file storage to the cloud.
The new era of access management
An identity and access management (IAM) solution is the padlock or firewall for the work-from-anywhere era. Before you give users access to any business resources, assets, or information, you should implement IAM as a critical component of your organization’s security program.
Recognizing and avoiding phishing scams
Phishing emails and text messages attempt to trick you into clicking on a link, opening an attachment, or sending proprietary information. Often the return address is the name of a person or company you recognize, leading you to believe the message is legitimate. But there are many ways for you to recognize phishing and to avoid falling for scams.