Safe Online Shopping: Tips for a Secure Experience

By Byron Martin | November 20, 2023
With Black Friday and Cyber Monday right around the corner, here are some tips for a safe and secure online shopping experience.

4 Things To Do Right Now To Prevent Your Cyber Insurance Claim From Being Denied

By Byron Martin | November 16, 2023
“Thank goodness” is probably what Illinois-based manufacturing company ICS thought about having a cyber insurance policy with Travelers Insurance..

How To Safely Share Passwords With Employees

By Byron Martin | November 6, 2023
If you ask a security professional, you get by-the-book advice about sharing passwords: “Don’t share passwords.” But we know, in reality, that..

Here’s What Google Maps Timeline Knows About You (And It’s More Than You Think)

By Byron Martin | October 30, 2023
It’s 10:00 p.m. – do you know where your children are? Google probably does. Thanks to Google Maps’ Timeline feature, the tech company probably knows..

Staying Cyber-Savvy: Outsmarting Criminals with Regular Software Updates

By Byron Martin | October 19, 2023
36% of survey participants reported installing the latest updates and software as soon as they become available. Of those who reported installing the..

Guardians of the Inbox: How to Recognize and Report Phishing

By Byron Martin | October 16, 2023
72% of respondents reported that they checked to see whether messages were legitimate (i.e. phishing or a scam) compared to 15% who reported not..

Enhance Your Online Security Now with Multifactor Authentication

By Byron Martin | October 10, 2023
In a recent National Cybersecurity Alliance survey, 57% of respondents said they have heard of multifactor authentication (MFA), but many people..

Lock It Down: The Power of Strong Passwords and Password Managers

By Byron Martin | October 5, 2023
Only 33% of individuals create unique passwords for all accounts (NCA)

CISA Kicks Off Cybersecurity Awareness Month With "Secure Our World" Campaign

By Byron Martin | October 2, 2023
October isn't just about falling leaves and pumpkin spice; it's also Cybersecurity Awareness Month, established in 2004 and dedicated to raising..

Improve Your Cybersecurity Awareness

By Byron Martin | September 26, 2023
If you’ve turned on the news sometime during the past few years, you’ve probably heard of more than one instance where a business closed due to a..

What Compliance Standards Does Your Business Need To Maintain?

By Byron Martin | August 28, 2023
Compliance standards are some of the most important things a business needs to maintain to be profitable and well-respected while staying out of..

Prepare Your Kids For A Successful School Year: Tech Tips To Maximize Learning Potential

By Byron Martin | August 17, 2023
Back-to-school season has finally arrived, and it won’t be long before our kids are back in the classroom, learning all sorts of different subjects...

Tek Video: The Probability of a Second Breach

By Byron Martin | August 7, 2023
If you've had a breach, statistically the likelihood of you having a second breach or more is very high.

From the Top Down: The Importance of Cybersecurity Leadership in Mitigating Business Risks

By Byron Martin | July 26, 2023
The days when cybersecurity was solely the concern of IT departments are long gone.

Shielding Your Cloud: Securing M365 and Google Workspace with SaaS Protection

By Byron Martin | June 20, 2023
Many organizations assume that moving to a cloud-based collaboration app such as Microsoft 365 or Google Workspace means email security and backup is..

Tek Video: Cyber Resilience

By Byron Martin | May 30, 2023
The FBI revealed in its 2022 Internet Crime Report that ransomware gangs breached the networks of at least 860 critical infrastructure organizations..

Tek Video: Top 5 Cybersecurity Musts

By Katrina Wahlbrink | May 25, 2023
Top 5 Cybersecurity Musts. So, what can you do?

The Cybersecurity Divide: Understanding the Cybersecurity Poverty Line

By Byron Martin | May 22, 2023
In today's digital age, cybersecurity has become a critical aspect of every organization's operations. Cyber-attacks can lead to financial losses,..

Tek Video: Cybersecurity Insurance Application Questions

By Byron Martin | May 16, 2023
The cyber insurance market is getting stricter with its application questions and requirements.

Tek Video: The Hacker Timeline

By Byron Martin | May 8, 2023
The average time it takes to identify a breach is 197 days. That's crazy. And then the average time to contain a breach is 69 days.

Tek Video: Myth - My Data is Safe in the Cloud

By Byron Martin | May 4, 2023
Microsoft works off what is called a shared responsibility model. The message is simple, Microsoft is responsible for its cloud, and end-users and ..

Tek Video: Myth - I'm Safe, I Have Current Cybersecurity Tools

By Byron Martin | May 1, 2023
Cybersecurity is much more than the tools.

Tek Video: Myth - I Can Recover from Backups

By Byron Martin | April 24, 2023
So here's the critical thing, the myth. And I touched on it a minute ago.

Tek Video: Social Engineering - Hacking People not Technology

By Byron Martin | March 28, 2023
Hacking people, not technology.

What is a Cybersecurity Tabletop Exercise?

By Byron Martin | March 23, 2023
Have you heard of a cybersecurity tabletop exercise or tabletop drill?

Tek Video: Microsoft 365 Security is a Shared Responsibility

By Byron Martin | March 14, 2023
Microsoft works off what is called a shared responsibility model. The message is simple, Microsoft is responsible for its cloud, and end-users and..

Tek Video: Ransomware as a Service (RaaS)

By Byron Martin | February 28, 2023
Another big, game-changing element of ransomware is that you don't have to be a hacker. You don't even have to have any technical expertise.

Break Free From the Break-fix IT Model

By Byron Martin | February 23, 2023
“If it ain’t broke, don’t fix it.” But is this approach harming your business?

Tek Video: Endpoint Security vs. Antivirus

By Byron Martin | February 15, 2023
Tek Video: Endpoint Security vs. Antivirus

10 Considerations for Hiring In-house IT vs Partnering with an MSP

By Byron Martin | February 13, 2023
10 Considerations for Hiring In-house IT vs Partnering with an MSP Does your business’s IT management need an upgrade?Are you wondering why your..

Why Your IT Provider Should be SOC 2 Accredited

By Byron Martin | January 20, 2023
Why Your IT Provider Should be SOC 2 Accredited A SOC 2 audit isn’t just a one-time exercise. The audit must be completed yearly, inspecting..

Six Ways to Build Cyber Resilience

By Byron Martin | October 10, 2022
83% of small and medium-sized businesses are not financially prepared to recover from a cyberattack.

How to Send an Encrypted Email in Microsoft Outlook

By Byron Martin | July 28, 2022
You’ve probably heard about email encryption and maybe you’ve even wondered when it’s necessary.

How to Transfer Microsoft Authenticator to a New Phone

By Byron Martin | June 2, 2022
Using multi-factor authentication (MFA) is one of the easiest and most successful ways to increase the security for your accounts. This can prevent..

Washington State Attorney General 2021 Data Breach Report Findings

By Byron Martin | June 1, 2022
In the last year, businesses and agencies sent a record 6.3 million data breach notices to Washingtonians.

Small Businesses are More Likely to be Targets of Cyber Attacks

By Byron Martin | April 19, 2022
Researchers at Barracuda Networks analyzed millions of emails across thousands of companies in 2021 and found that on average, an employee of a small..