
What is Business Email Compromise Business Email Compromise (BEC) is an email-based phishing attack where… Read More

How to Do a HIPAA Risk Assessment
February 23, 2022, Compliance
What is a HIPAA Risk Assessment? HIPAA regulations require healthcare organizations to conduct an annual… Read More

Is Zero Trust the Future for Data Security?
December 23, 2021, Data Security
Prior to the advent of the coronavirus pandemic, the term ‘zero trust’ was seen by… Read More

What to Do After a Phishing Attack: A 12-Step Recovery Plan
November 9, 2021, Data Security
A phishing attack, which typically arrives in the form of an email, is where an… Read More

Why Cybersecurity Must Include Active Directory
September 20, 2021, Data Security
Despite the fact that increasingly more organizations are utilizing cloud-based services for their business operations… Read More

How to Implement Zero Trust Security in the Cloud
August 24, 2021, Data Security
The Zero Trust security principle is centered around the presumption that everything and everyone within… Read More