This Month in Cyber Security October Preview (2:39)

New cyber threats emerge on a weekly basis, but are all of them relevant to your organization? Each month, our security team hosts a 30-minute webinar to discuss the latest threats and breakdown their applicability to small and medium-sized organizations, and cost-effective steps to mitigate risk. October was Cyber Security Awareness Month and, as usual, [...]

By | 2018-12-18T12:01:03+00:00 November 7th, 2018|Security Solutions|0 Comments

This Month in Cyber Security September Preview (1:56)

New cyber threats emerge on a weekly basis, but are all of them relevant to your organization? Each month, our security team will host a 30-minute webinar to discuss the latest threats and breakdown their applicability to small and medium-sized organizations, and cost-effective steps to mitigate risk. September had a lot of topical cyber news. [...]

By | 2018-12-18T12:01:29+00:00 September 25th, 2018|Security Solutions|0 Comments

Business Email Compromise: Are you at Risk? (Video Preview 1:49)

Business Email Compromise: Are you at Risk? The short answer is YES. The odds are 50/50 that your organization has an ACTIVE mailbox compromise right now. Feeling lucky? Business Email Compromise (BEC) targets businesses by using social engineering tactics like spear-phishing and spoofing to gain the confidence of your employees for the purposes of redirecting [...]

By | 2018-12-18T12:02:12+00:00 August 21st, 2018|Security Solutions|Comments Off on Business Email Compromise: Are you at Risk? (Video Preview 1:49)

Business Email Compromise is Rampant – How to Protect Yourself

Hackers are continuing to evolve their techniques to get through a company’s defenses. And why shouldn’t they, when the reward for getting into your mailbox can be so lucrative? The cat-and-mouse game that criminals and security professionals play is happening every day at all hours, and despite the best efforts of IT security, would-be cyber [...]

By | 2018-12-18T12:02:22+00:00 August 13th, 2018|Security Solutions|Comments Off on Business Email Compromise is Rampant – How to Protect Yourself

PULSE Alarm

Our PULSE Alarm Security Response service provides 24×7 monitoring, alerting, and response for security events on your critical infrastructure. Using our Security Information and Event Management (SIEM) platform our team can help identify and respond to security breaches to minimize loss. Included within PULSE Alarm is an annual vulnerability scan, weekly security analyst trend reviews, [...]

By | 2018-09-05T09:48:55+00:00 July 16th, 2018|Monthly Focus|Comments Off on PULSE Alarm

Cybersecurity Forum Breakdown

Recently, the Greater Oak Brook Chamber of Commerce held a Cybersecurity Forum to help keep its members updated on how to protect themselves and their organizations. After a comprehensive presentation covering the cyberthreats to businesses by an FBI special agent, our own Rachael Narel moderated a panel about cybersecurity with local industry leaders. Many of [...]

By | 2018-12-18T12:05:09+00:00 May 30th, 2018|Security Solutions|Comments Off on Cybersecurity Forum Breakdown

The Business of Hacking your Business

Whether its ransomware, credential compromise, distributed denial of service, or phishing: hacking your business has itself turned into a business. There are entire organizations dedicated to targeting networks and infrastructure. Because of the nature of the economy, there is always someone who benefits from a disruption. Government, businesses, and schools are all potential targets. No [...]

By | 2018-12-18T12:04:59+00:00 May 16th, 2018|Security Solutions|Comments Off on The Business of Hacking your Business

Phishing Cybersecurity Threat

Phishing is the biggest cybersecurity threat to all businesses, large and small. In 2017, 91% of successful data breaches began with a spear-phishing attack. Spotting signs of phishing early is the most important way to protect your business. Thus, your organization’s employees can either be your first line of defense or your greatest security weakness. [...]

By | 2018-05-10T12:20:58+00:00 May 10th, 2018|Monthly Focus|Comments Off on Phishing Cybersecurity Threat

Hunting for Phishing in Office 365

The scariest aspect of a phishing attack is that it only takes a single employee clicking on a PDF attachment or enabling macros on an Excel document for your business to be infiltrated. One compromised inbox can result in days or weeks of headaches for your IT department. A ransomware attack can cost you in [...]

By | 2018-12-18T12:07:22+00:00 March 19th, 2018|Security Solutions|Comments Off on Hunting for Phishing in Office 365

Configuring Office 365 to help in the battle against phishing and spam

Battling spam and curbing phishing attacks seem to be continual challenges for many organizations. While there are many technical controls to help fight the good fight, end users are largely responsible for handling junk mail and keeping a watchful eye out for the evil that lurks within email messages. There are many products that front-end [...]

By | 2018-12-18T12:10:37+00:00 September 27th, 2017|Security Solutions|Comments Off on Configuring Office 365 to help in the battle against phishing and spam