What Are Security Incidents?

What Are Security Incidents?

Every business or organization should have security measures put in place to handle security incidents. In this video and blog post, we examine what security incidents are, different types of security incidents and how your business can be prepared.  Article Topics:...
October is Cybersecurity Awareness Month!

October is Cybersecurity Awareness Month!

Cybersecurity Awareness Month is a great time to educate yourself and your employees about the dangers that lurk online. Not sure where to start? We’ve got you covered! The 2021 Cybersecurity Awareness Month Resource Kit, from our partner KnowBe4, comes packed...
Top 3 Cybersecurity Threats Businesses Face Today

Top 3 Cybersecurity Threats Businesses Face Today

Regardless of size, businesses today must contend with growing cybercrime perpetrated by hackers looking to steal user credentials, access sensitive data, or extort money. With the global cost of cybercrime projected to reach over $6 trillion by the end of 2021, it’s...
The Importance of Password Management for Business

The Importance of Password Management for Business

Every business or organization should have a system in place for Password Management. In this video and blog post, we examine why passwords are a top target for cybercriminals and what your business can be doing to protect and manage your passwords. Article...
What is PII?

What is PII?

Article Topics: What is PII? Where is PII Stored? What Happens if PII Becomes Breached? Federal Law and PII Tips to Protect PII What is PII?  PII stands for Personally Identifiable Information.  The National Institute of Standards and Technology (NIST) defines PII as...
INDALA Badge Cloning Using a Home-Brewed Hacking Device

INDALA Badge Cloning Using a Home-Brewed Hacking Device

In this episode of How Do Hackers Do Things, GraVoc Security Consultant, Josh Jenkins, goes into PART 2 of how hackers can steal and clone badges. During this video, Josh will show you how hackers can attempt to steal INDALA Badges using a home-brewed hacking device...
What is Red Team in Cybersecurity?

What is Red Team in Cybersecurity?

What is Red Team in Cybersecurity? In this blog post and video, we explore what Red Teaming consists of and how businesses are using this exercise to keep their operations secure. Scroll below for an animated video explanation or read the transcript below! What is Red...

Pin It on Pinterest