Business Continuity: How to Be Prepared for Downtime or an IT Disaster

By Byron Martin | January 28, 2021
Flood. Power outage. Cyberattack. Supply chain failure or a disgruntled employee. Disruptions to your business can happen at any moment causing..

BYOD: Let’s Talk about Mobile Device Management

By Byron Martin | January 26, 2021
87% of companies are dependent to some extent on their employee’s ability to access mobile business apps from their personal smartphones. (Source: ..

Data Breach Notifications Laws for Washington State

By Byron Martin | January 22, 2021
New data breach protections give Washington one of the most robust data breach notification policies in the country.

Incident Response: How to Respond to an Email Breach

By Byron Martin | January 18, 2021
Business Email Compromise earned hackers $1.3 billion in a year. (Source: Internet Crime Complaint Center)

The Human Toll of a Healthcare Cyberattack

By Byron Martin | January 15, 2021
Vermont hospital cyber attack “Clinics were filled with tears, yelling and anxiety and stress”.

SolarWinds Orion Supply Chain Breach Update

By Byron Martin | January 14, 2021
Roughly 198 organizations, overall, were hacked using the SolarWind backdoor, according to Allan Liska, a threat analyst atRecorded Future.Source:..

SUNBURST Malware and SolarWinds Supply Chain Breach

By Byron Martin | December 31, 2020
As reported approximately 2 weeks ago, the US Government and thousands of public and private sector organizations around the world had their networks..

Massive SolarWinds Hack Impacting 18,000 Organizations

By Byron Martin | December 23, 2020
18,000 organizations have malicious code in their network, and 50 of them have suffered major breaches.

I Fell Victim to Business Email Compromise. Now What?

By Byron Martin | December 22, 2020
The FBI defines Business Email Compromise (BEC) as “a sophisticated scam that targets both businesses and individuals who perform valid..

CyberSecurity: Journey, Culture and Strategy

By Byron Martin | December 2, 2020
It doesn't have to be a big stress in your life. You can have that peace of mind, but it does take time, attention, planning and strategy...

Four Steps of an Incident Response Plan

By Byron Martin | December 1, 2020
Hackers attack every 39 seconds, on average 2,244 times a day. (University of Maryland) Incidents are cyber events that can include a cyberattack,..

Stay Safe Online - 5 Tips for Safe Online Shopping

By Byron Martin | November 25, 2020
The holiday shopping season is well underway, and many are choosing to shop primarily online due to the COVID-19 Pandemic. Online shopping opens the..

What is the Definition of Phishing?

By Byron Martin | November 17, 2020
phish·ing /ˈfiSHiNG/ noun the practice of using fraudulent e-mails and copies of legitimate websites to extract financial data from computer users..

What's the Difference Between Antivirus and Endpoint Security?

By Byron Martin | November 12, 2020
Every endpoint connected to the Internet faces 1.5 attacks per minute. According to a study by the Ponemon Institute, 68% of organizations have..

10 Tips for Better Password Security

By Byron Martin | November 9, 2020
81% of data breaches are caused by compromised, weak, and reused passwords. Password security is a key to keeping your information safe on the web.

Local Businesses Falling Prey to Phishing Email!

By Byron Martin | November 4, 2020
Teknologize has recently seen a major uptick in email-based cyberattacks happening right now and right here in our own backyard.

FBI Warns Imminent Cyber Attacks Threatening Healthcare

By Byron Martin | November 3, 2020
In a joint alert, Wednesday October 28th, 2020 from the FBI, DHS, and the Cybersecurity and Infrastructure Security Agency states “credible..

Business Email Compromise (BEC) & Wire Fraud

By Byron Martin | October 10, 2020
Also known as CEO Fraud. Listen to CEO, Byron Martin, explain how hackers can get access to your email and what to be aware of. This is a billion..

Top 4 Cybersecurity Basics to Implement Now

By Byron Martin | October 8, 2020
October is National Cybersecurity Awareness Month. Instituted by the Department of Homeland Security in 2016, this month is a time where we want to..

What is Multifactor Authentication (MFA)?

By Byron Martin | September 29, 2020
"Only 11% of enterprise users make use of those tools (Speaking of MFA). That means a staggering 89% of accounts remain open to fairly simple..

What is Security Awareness Training?

By Byron Martin | September 22, 2020
92% of all breaches could have been prevented with a Security Awareness Training program. Security Awareness Training is a means to educate and..

What is Business Email Compromise (BEC) aka CEO Fraud?

By Byron Martin | September 17, 2020
More than 30,700 organizations were targeted in the first quarter of 2020 with Business Email Compromise attacks.

Work from Home - 4 Ways to Stay Secure

By Daniel Morgan | September 13, 2020
Since the onset of the COVID-19 pandemic, many companies have spent the last few months scrambling to get their staff properly set up for remote work.

What is Managed Detection and Response (MDR)?

By Byron Martin | September 12, 2020
The Average Time it takes to identify a data breach is 197 days. The average time it takes to contain a breach is 69 days. With the volume of cyber..

What is Ransomware?

By Byron Martin | September 11, 2020
The average ransom paid by a victim, increased by 60%, rising from $111,605 to $178,254 - according to a recent report from Coveware, comparing the..

Introducing RansomCloud. The Evolution of Ransomware.

By Byron Martin | September 9, 2020
RansomCloud attacks your cloud data! It’s a ransomware attack built for the cloud...

5 Tips to Prevent Business Email Compromise (BEC)

By Byron Martin | August 3, 2020
Business Email Compromise (BEC) is one of the leading cyber threats today so it's important to know that there are many valuable tips for keeping..

What is the Dark Web?

By Byron Martin | July 31, 2020
There are multiple layers to the internet. The Dark Web is an unseen layer contained within the Deep Web, another sub-layer of the Internet that is..

FBI Reports Business Email Compromise (BEC) Cost Businesses $1.7B in 2019

By Byron Martin | July 30, 2020
Let me tell you a True Story about a Business Email Compromise BEC. It was one of those calls that I sometimes dread not knowing entirely what to..

Manufacturing Represents 62% of Ransomware Payouts

By Byron Martin | July 27, 2020
Manufacturing Represents 62% of all Ransomware Payments In 2017 Kivu facilitated ransom payments of over $17m for over 143 cases . Of..

Why you should use MFA for everything!

By Byron Martin | June 22, 2020
Have you had your password stolen? According to Avast, a company that specializes in anti-virus software and VPN services, over 29 billion passwords..

Why You Should Enable Multi-Factor Authentication Today!

By Byron Martin | May 28, 2020
Multi-factor authentication is a methodology whereby someone is granted access to a computer, device, or application only after providing two or..

Why Identity Theft is a Big Deal During COVID-19

By Byron Martin | May 22, 2020
Should you be concerned about your identity being compromised? Yes! In 2019,14.4 million consumersbecame victims of identity fraud — that’s about 1..

Quadrupled Cyber Threat vs Security Awareness Training

By Byron Martin | May 8, 2020
I had a couple statistics that I was looking at last week, and they kind of blew my mind, so I thought I'd share them with you.

The Basic Framework of COVID-19 Themed Wire Fraud

By Byron Martin | May 7, 2020
According to a report from Microsoft, COVID-19-themed cyber attacks spiked to nearly a million a day during the first week of March 2020.

Is Zoom Safe? Zoom Meeting Security Tips During COVID-19

By Byron Martin | April 13, 2020
The FBI has received multiple reports of video teleconferencing and online classroom hijacking, also called “Zoom-bombing”, during the COVID-19.