We explore cyber risks in higher education and how penetration testing can help universities protect their people, data, and reputation.
Information Security Category
Cybersecurity Q&A Series: How to Check if my Business Email Has Been Compromised?
Learn how to check if your business email address has been compromised and what steps to take next to protect your business.
Cybersecurity Q&A Series: How to Detect AI-Generated Phishing Emails?
In this blog post, we break down the behavioral signs that can help you recognize an AI-generated phishing email.
Cybersecurity Q&A Series: Are CAPTCHAs Enough to Stop Bots from Spamming Web Forms?
We explore what CAPTCHA is, why it is becoming less effective, and what alternate strategies your business can adopt to protect web forms.
Cybersecurity Q&A Series: How Secure Is Microsoft Copilot?
Learn the key security differences between Microsoft Copilot and licensed Microsoft 365 Copilot, including best practices for safe use.
Email Security: How Protecting Your Domain Improves Deliverability & Brand Reputation
Learn why securing your domain against email fraud is essential to building a stronger brand and check your domain’s current security status!
Top 5 Vulnerabilities Found During Penetration Testing: Lessons from Our Webinar
In this webinar recap, we explore the common security vulnerabilities that our experts repeatedly find during a penetration testing exercise!
CMMC 2.0 Explained: Requirements, Changes & Implementation Timeline
In this blog post, we answer some commonly asked questions about CMMC 2.0 requirements, updates, and implementation timeline.
Microsoft SharePoint Exploit Alert: On-Premises Servers at Risk
Learn about the latest actively exploited vulnerabilities affecting SharePoint Server 2016, 2019, and Subscription Edition & how to protect your environment.
Business Email Compromise: Top BEC Tactics & How to Protect Against Them
We take a look at Business Email Compromise, including common BEC tactics and what your business can do to protect against them.
FFIEC CAT Sunset: Why the CRI Profile is a Strong Alternative
With the FFIEC CAT sunset approaching, we explore why the CRI Profile is a strong alternative to the CAT for financial institutions!
FTC Safeguards Rule Compliance for Auto Dealerships
We’ll go over the FTC Safeguards Rule, what it requires, and how a managed service provider can help auto dealerships stay compliant.
Does Your Business Need a Dark Web Assessment?
In this blog post, we explore the cybersecurity risks of the dark web and why your business should conduct a dark web assessment.
Malware-Free Attacks, Shorter Breakout Time: Why You Need Adversary Simulation Testing
Insights from the CrowdStrike 2025 Global Threat Report can explain why businesses need adversary simulation testing to stay ahead of risks!
Q&A with Blackpoint: Benefits of Managed Detection & Response (MDR) for SMBs
We spoke with Nicole LaDue, Senior Partner Account Manager at Blackpoint, to discuss why MDR for SMBs is a critical security investment!
What is the Difference Between Penetration Testing & Vulnerability Scanning?
We explore the differences between penetration testing and vulnerability scanning and how to prepare your business for each assessment!
Cybersecurity Threat Predictions for 2025 from a Security Expert
GraVoc’s Director of IT Assurance & Security Research, Michael Kannan, shares his top cybersecurity threat predictions for 2025.
Guide to eCommerce Security Best Practices for Your Online Store
This Cybersecurity Awareness Month, we dive into eCommerce security, including common threats, and best practices to protect your online store!
Advanced Threat Detection & Response (TDR) for Small Businesses
In this blog post, we explore the benefits of threat detection & response for small businesses as well as best practices and available MDR technologies.
Expert Take: Why Regular IT Audits Are Important for Businesses
In this blog post, our Director of Risk Management & Audit, Brian Brunelle, explains why businesses should conduct regular IT audits.



















