Learn why securing your domain against email fraud is essential to building a stronger brand and check your domain’s current security status!
Information Security Category
Top 5 Vulnerabilities Found During Penetration Testing: Lessons from Our Webinar
In this webinar recap, we explore the common security vulnerabilities that our experts repeatedly find during a penetration testing exercise!
CMMC 2.0 Explained: Requirements, Changes & Implementation Timeline
In this blog post, we answer some commonly asked questions about CMMC 2.0 requirements, updates, and implementation timeline.
Microsoft SharePoint Exploit Alert: On-Premises Servers at Risk
Learn about the latest actively exploited vulnerabilities affecting SharePoint Server 2016, 2019, and Subscription Edition & how to protect your environment.
Business Email Compromise: Top BEC Tactics & How to Protect Against Them
We take a look at Business Email Compromise, including common BEC tactics and what your business can do to protect against them.
FFIEC CAT Sunset: Why the CRI Profile is a Strong Alternative
With the FFIEC CAT sunset approaching, we explore why the CRI Profile is a strong alternative to the CAT for financial institutions!
FTC Safeguards Rule Compliance for Auto Dealerships
We’ll go over the FTC Safeguards Rule, what it requires, and how a managed service provider can help auto dealerships stay compliant.
Does Your Business Need a Dark Web Assessment?
In this blog post, we explore the cybersecurity risks of the dark web and why your business should conduct a dark web assessment.
Malware-Free Attacks, Shorter Breakout Time: Why You Need Adversary Simulation Testing
Insights from the CrowdStrike 2025 Global Threat Report can explain why businesses need adversary simulation testing to stay ahead of risks!
Q&A with Blackpoint: Benefits of Managed Detection & Response (MDR) for SMBs
We spoke with Nicole LaDue, Senior Partner Account Manager at Blackpoint, to discuss why MDR for SMBs is a critical security investment!
What is the Difference Between Penetration Testing & Vulnerability Scanning?
We explore the differences between penetration testing and vulnerability scanning and how to prepare your business for each assessment!
Cybersecurity Threat Predictions for 2025 from a Security Expert
GraVoc’s Director of IT Assurance & Security Research, Michael Kannan, shares his top cybersecurity threat predictions for 2025.
Guide to eCommerce Security Best Practices for Your Online Store
This Cybersecurity Awareness Month, we dive into eCommerce security, including common threats, and best practices to protect your online store!
Advanced Threat Detection & Response (TDR) for Small Businesses
In this blog post, we explore the benefits of threat detection & response for small businesses as well as best practices and available MDR technologies.
Expert Take: Why Regular IT Audits Are Important for Businesses
In this blog post, our Director of Risk Management & Audit, Brian Brunelle, explains why businesses should conduct regular IT audits.
Essential Tips for Securing Your WordPress Website
This Cybersecurity Awareness Month, learn about WordPress security. Here, we explore 7 steps you can take to secure your WordPress website.
Cybersecurity Awareness Month 2024 Resource Kit
October is Cybersecurity Awareness Month! Leverage this FREE KnowBe4 resource kit to build a strong security culture within your business.
Why Do Hackers Target Small Businesses?
In this blog post, we explore why hackers target small businesses, common security threats, and how to stay protected against attacks.
Watch Out for These 5 Types of Social Engineering Attacks
We explore 5 common types of social engineering attacks, such as phishing and pretexting, and how they’re different from each other!
Stay Vigilant Against Cybersecurity Threats During 4th of July Holiday
Here are some proactive security measures you can implement to keep your cybersecurity posture strong during the 4th of July holiday!