Card image cap

May 7, 2020 | Peter

Five Ways to Defend Against COVID-19 Scams

From tricking people into revealing sensitive information on social media to requesting donations for fraudulent charities, cybercriminals have been working hard to leverage the hype and fear surrounding COVID-19.

Continue Reading

Card image cap

May 5, 2020 | David Powell

Improving Business Efficiency Post COVID-19

While we do not have all of the answers, we do have some suggestions on ways to improve efficiencies in your business and gain a competitive edge in light of the recent COVID-19 pandemic. There is no playbook for businesses on how to reopen after a pandemic related shutdown, so everyone will be looking for the best path forward.

Continue Reading

Card image cap

April 27, 2020 | Peter

How Social Media Trends are Exposing Your Personal Information

Latest Social Media trends include sharing your senior photo alongside details such as the name of your high school, the year you graduated, and your mascot. Hackers are using these personal details to gain access to your confidential accounts and personal data. Skip the trend and protect your personal data.

Continue Reading

Card image cap

April 20, 2020 | Lizzie Danielson

SHIELD Act Compliance: The Definitive Guide for New York Businesses

SHIELD Act requires companies to implement and maintain reasonable security measures. Affected businesses must deploy safeguards to protect the security, confidentiality, and integrity of private information of New York residents including, but not limited to, secure disposal of data.

Continue Reading

Card image cap

April 17, 2020 | Delano Collins

Why Endpoint Detection & Response is so important for your Remote Workforce

Endpoint Detection & Response (EDR) is a critical tool in combatting cybersecurity threats. The best EDR solutions are used to detect anomalous activity on endpoints (servers, workstations, laptops, and some mobile devices). While some mistakenly assume antivirus does these same things, antivirus only looks for known bad programs that match a specific signature

Continue Reading

Card image cap

April 15, 2020 | Ross Fillipek

Remote Workforce- Cybersecurity & Policy & Software Deployment

As the COVID-19 pandemic continues to necessitate that many employees work from home, businesses are struggling to ensure that this newfound flexibility doesn’t negatively impact their cybersecurity efforts

Continue Reading

Card image cap

April 9, 2020 | Johnny Walton

Zoombombing: How to Secure Your Remote Workforce

Zoombombing, Zoom-bombing or Zoom raiding is the unwanted intrusion into a video conference call by an individual, which causes disruption.

Continue Reading

Card image cap

April 8, 2020 | Lizzie Danielson

Corsica Technologies Recognized as Top 100 Security Providers by CRN

MSP and Cybersecurity company Corsica Technologies, announced today that CRN ® , a brand of The Channel Company, has named Corsica to its annual Security 100 list

Continue Reading

Card image cap

April 3, 2020 | Ryan Ferguson

Remote Workforce: How to Connect Your Team Securely Without Interruptions

While working remote isn’t new to the tech world it is new for many other industries that are adapting to this new environment due to COVID-19 and with this increase in the remote workforce, cyber attackers are taking advantage. This means that ransomware and malware are at an all-time high.

Continue Reading

Card image cap

March 25, 2020 | Delano Collins

Remote Workers During COVID-19, How’s Your Cyber Security?

Businesses around the world are proving their resilience during the current state of pandemic brought on by Coronavirus or COVID-19 by embracing remote work. Traditional commuters are now connecting remotely to their office networks and using video conferencing at an increasing rate.

Continue Reading