Category Cyber Security Awareness

Hybrid work and cyber security: 4 trends among SMBs

How do small business owners feel about hybrid work and cyber security two years after the COVID-19 pandemic upended workplace norms? We set out to answer this question in early 2022, commissioning OnePoll to conduct a survey, The Pros and Cons of a Hybrid Workplace. OnePoll asked 1000 respondents across the US a series of […]

VPNs: Security Best Practices for Businesses

Securing the way remote users can access an organization’s local network has quickly become one of the most important security challenges for administrators. Many security experts affirm the value of deploying Virtual Private Networks (VPNs), which are powerful solutions that reduce your network’s threat surface. Unfortunately, when used incorrectly, VPNs can actually increase your security […]

Data backups: What business owners should know

Data loss is a major worry plaguing IT professionals and business owners alike. Data loss or damage can restrict access to essential files—even destroying them completely. Losing access to this data can affect or halt daily operations. One report surveying IT professionals found that data loss is most commonly caused by hardware or system failure […]

What is the difference between MDR, XDR, and EDR?

The cyber security industry should come with a glossary to cover all the acronyms it uses. We’ve talked about some of the more common terms in the past, but today we’re taking a closer look at three big ones: MDR, XDR, and EDR. What do these three acronyms mean, exactly? The short answer is easy […]

Potential cyber security implications of the Russia-Ukraine conflict

On 24 February 2022, Russia invaded Ukraine, leading to a large-scale ongoing conflict across the country. Tensions had grown in the region since December 2021, when Russia started amassing its troops near the Ukrainian border. Roughly a month later, several governments and private sources reported on cyber attacks targeting the Ukrainian government and private entities. […]