-
How to Create the Perfect Password
You’ve heard it for years: “password” is a terrible password to use. But, it hasn’t stopped millions of users from picking the simplest and easiest-to-guess passwords, like “123456” and “password.”…
-
How to Create a Cybersecurity Training Curriculum
Cyberattacks are on the rise, specifically targeting highly regulated industries like healthcare, financial services and legal. Educating your users on cybersecurity antics, what to watch for and how to detect…
-
The Top 2 Vulnerabilities Hackers Will Exploit to Steal Your Data
“During the next five years, cyber-crime might become the greatest threat to every person, place and thing in the world,” according to CSO, an online organization who provides news, analysis…
-
Weathering the Storm: How Business Continuity Prepares Your Organization for Mother Nature’s Worst
As Hurricane Florence is about to make landfall in the Carolinas, promising to wreak havoc on tens of thousands of businesses and millions of residents, our thoughts are with our…
-
FBI Issues Warning About VPNFilter Router Attacks
The FBI recently issues a warning about a malware attack specifically targeted at “consumer-grade” routers. The malware, called VPNFilter, is believed to have originated in Russia. The list of routers…
-
What Does Landscaping Have to Do With Specialized IT? (Everything, Actually.)
Quick personal story: we’re currently doing some landscaping at our house. I don’t happen to have a particularly green thumb, so I needed to replace some plants that weren’t “cooperating”…
-
Why Cloud Technology Enables Top-Line Growth in CPA and Accounting Firms
We had a great time as a guest on a recent webinar hosted by Jim Boomer, CEO of Boomer Consulting. Jim sat down with our VP of Financial Services Strategy,…
-
5 Things You Need to Know About Spearphishing
The FBI reports that Business Email Compromise (BEC) scams have cost companies over two billion in the past two years. Further, Aviva reports that after your company is breached, 60…
-
Understanding the AICPA Independence Rule’s Impact on Your Firm’s Audit Revenue
In 2017, the AICPA ruled that CPA and accounting firms are no longer able to host data and audit financials of the same company, beginning September 1, 2018. CPA and…
-
Security Snippets: GDPR and Royal Wedding Phishing Scams
Social engineers are opportunists, continually seeking out new and creative ways to scam users into providing personal and financial information. They’ll often develop topically relevant phishing scams around major holidays…