When you next try to renew your cybersecurity insurance, you might find the process for approval and the policies available are quite different from before.
Blog
Just Right: How can HVAC give us all our own Goldilocks zone?
Join Berardo Matalucci (Co-founder and CEO at MIMiC) and Noah Landow (Founder and CEO at Macktez) for an informal conversation between a leading technology solutions firm and the founder of an innovative, engineering driven startup reframing heating cooling from a building to a personal scale.
Microsoft finally honors DMARC
Configured properly, and then monitored and adjusted over time, DMARC can reduce cybersecurity risks and increase deliverability for legitimate email. (Configured improperly, however, DMARC instructions could result in all of your outgoing email getting rejected — so you need to know what is going on under the hood.)
Las Vegas ransomware incident highlights need for cybervigilance
A ransomware incident ensnaring two of Las Vegas’s largest casinos made national headlines last month and inspired a lot of questions about ransomware, multi-factor authentication, single-sign on, access management, and vishing. What happened? What went wrong?
Fast, Cheap, and Good: Cases for local storage in an age of cloud
Our first event at our new office was a conversation about the best circumstances for local storage at time when most organizations are moving file storage to the cloud.
The new era of access management
An identity and access management (IAM) solution is the padlock or firewall for the work-from-anywhere era. Before you give users access to any business resources, assets, or information, you should implement IAM as a critical component of your organization’s security program.
Recognizing and avoiding phishing scams
Phishing emails and text messages attempt to trick you into clicking on a link, opening an attachment, or sending proprietary information. Often the return address is the name of a person or company you recognize, leading you to believe the message is legitimate. But there are many ways for you to recognize phishing and to avoid falling for scams.
Business phone services now require registration for text messaging
If you are using a mobile app for your business phone service (like RingCentral, Zoom, or Dialpad), you might be used to using SMS text messaging to connect with your contacts. But now, due to new regulations, SMS through business phone services will be restricted until your organization is approved to send business-related SMS.