What is the Definition of Phishing?

By Byron Martin | November 17, 2020
phish·ing /ˈfiSHiNG/ noun the practice of using fraudulent e-mails and copies of legitimate websites to extract financial data from  computer..

What's the Difference Between Antivirus and Endpoint Security?

By Byron Martin | November 12, 2020
Teknologize CEO, Byron Martin, and CTO, Dan Morgan sat down to discuss the difference between antivirus software and endpoint security.

10 Tips for Better Password Security

By Byron Martin | November 9, 2020
81% of data breaches are caused by compromised, weak, and reused passwords. Password security is a key to keeping your information safe on the web.

Local Businesses Falling Prey to Phishing Email!

By Byron Martin | November 4, 2020
Teknologize has recently seen a major uptick in email-based cyber attacks happening right now and right here in our own back yard. 

FBI Warns Imminent Cyber Attacks Threatening Healthcare

By Byron Martin | November 3, 2020
In a joint alert, Wednesday October 28th, 2020 from the FBI, DHS, and the Cybersecurity and Infrastructure Security Agency states “credible..

Business Email Compromise (BEC) & Wire Fraud

By Byron Martin | October 10, 2020
Also known as CEO Fraud. Listen to CEO, Byron Martin, explain how hackers can get access to your email and what to be aware of. This is a billion..

Top 4 Cybersecurity Basics to Implement Now

By Byron Martin | October 8, 2020
October is National Cybersecurity Awareness Month. Instituted by the Department of Homeland Security in 2016, this month is a time where we want..

What is Multifactor Authentication (MFA)?

By Byron Martin | September 29, 2020
"Only 11% of enterprise users make use of those tools (Speaking of MFA). That means a staggering 89% of accounts remain open to fairly simple..

What is Security Awareness Training?

By Byron Martin | September 22, 2020
92% of all breaches could have been prevented with a Security Awareness Training program. Security Awareness Training is a means to educate and..

What is Business Email Compromise (BEC) aka CEO Fraud?

By Byron Martin | September 17, 2020
More than 30,700 organizations targeted in the first quarter of 2020 with Business Email Compromise attacks. 

Work from Home - 4 ways to stay secure

By Daniel Morgan | September 13, 2020
Since the onset of the COVID-19 pandemic, many companies have spent the last few months scrambling to get their staff properly set up for remote..

What is Managed Detection and Response (MDR)?

By Byron Martin | September 12, 2020
The Average Time it takes to identify a data breach is 197 days.  The average time it takes to contain a breach is 69 days.  With the volume of..

What is Ransomware?

By Byron Martin | September 11, 2020
The average ransom paid by a victim, increased by 60%, rising from $111,605 to $178,254 - according to a recent report from Coveware, comparing..

Introducing RansomCloud. The Evolution of Ransomware.

By Byron Martin | September 9, 2020
RansomCloud attacks your cloud data! It’s a ransomware attack built for the cloud...

5 Tips to Prevent Business Email Compromise (BEC)

By Byron Martin | August 3, 2020
Business Email Compromise (BEC) is one of the leading cyber threats today so it's important to know that there are many valuable tips for keeping..

What is the Dark Web?

By Byron Martin | July 31, 2020
There are multiple layers to the internet. The Dark Web is an unseen layer contained within the Deep Web, another sub-layer of the Internet that..

FBI Reports Business Email Compromise (BEC) Cost Businesses $1.7B in 2019

By Byron Martin | July 30, 2020
Let me tell you a True Story about a Business Email Compromise BEC.   It was one of those calls that I sometimes dread not knowing entirely what..

Manufacturing Represents 62% of Ransomware Payouts

By Byron Martin | July 27, 2020
Manufacturing Represents 62% of all Ransomware Payments   In 2017  Kivu   facilitated  ransom payments of over $17m for  over  143 cases .   Of..

Why You Should Enable Multi-Factor Authentication Today!

By Byron Martin | May 28, 2020
Multi-factor authentication is a methodology whereby someone is granted access to a computer, device, or application only after providing two or..

Quadrupled Cyber Threat vs Security Awareness Training

By Byron Martin | May 8, 2020
I had a couple statistics that I was looking at last week, and they kind of blew my mind, so I thought I'd share them with you.

A Password is like a Toothbrush

By Byron Martin | March 15, 2019
When was the last time you thought about the password policy for your business?