What is Business Email Compromise Business Email Compromise (BEC) is an email-based phishing attack where… Read More
How to Do a HIPAA Risk Assessment
February 23, 2022, Compliance
What is a HIPAA Risk Assessment? HIPAA regulations require healthcare organizations to conduct an annual… Read More
Is Zero Trust the Future for Data Security?
December 23, 2021, Data Security
Prior to the advent of the coronavirus pandemic, the term ‘zero trust’ was seen by… Read More
What to Do After a Phishing Attack: A 12-Step Recovery Plan
November 9, 2021, Data Security
A phishing attack, which typically arrives in the form of an email, is where an… Read More
Why Cybersecurity Must Include Active Directory
September 20, 2021, Data Security
Despite the fact that increasingly more organizations are utilizing cloud-based services for their business operations… Read More
How to Implement Zero Trust Security in the Cloud
August 24, 2021, Data Security
The Zero Trust security principle is centered around the presumption that everything and everyone within… Read More
