What Businesses Can Learn from The Kaseya Ransomware Attack

The Kaseya Ransomware attack could affect thousands of SMBs -- and Kaseya did everything right. Unfortunately, attacks that employ zero-day exploits are almost impossible to prevent -- so what can businesses do to prepare?
July 22, 2021
Read More

How to Fix IP Overlap with OpenVPN Cloud

Multi-cloud networking is the new reality for businesses — and issues that arise from overlapping IP addresses can hold companies back. Thankfully, a feature in OpenVPN Cloud now solves this problem.
June 17, 2021
Read More

What the Hafnium Attacks Tell Us About Today’s Ransomware Threat

Not too long ago, Microsoft faced a ransomware attack that affected thousands of organizations. What can businesses learn from this -- and how can you mitigate this risk?
May 6, 2021
Read More

Why Nation State Attacks Are Now A Problem For Everyone

In cybersecurity circles, there are a couple of well-worn beliefs about nation state threats. One holds that they are only relevant to a relatively small number of critical infrastructure, defense, and government organizations.
March 18, 2021
Read More

Get the Most Security Out of Your SaaS Tools

These days, almost every business uses SaaS tools on a regular basis. Here's how to make sure they're secure.
September 8, 2020
Read More

Network Security: The Basics

Network security consists of preventing and protecting against unauthorized encroachment into corporate networks. Network security focuses on how devices interact rather than on the actual devices, like endpoint security. Network security and endpoint security go hand-in-hand. SANS Institute expands the definition of network security: “Network security is the process of taking physical and software preventive […]
July 31, 2020
Read More

Coronavirus Scams Are Infecting Devices Around the Globe

As the threat of coronavirus increases, businesses are sending employees to work from home, but with the social distancing comes a new threat – cyber attacks.
March 18, 2020
Read More


SIM hacking is not exclusive to T-Mobile though — in fact, this could happen at any carrier. You can add another layer of protection to your phone by adding a SIM PIN.
December 6, 2019
Read More

2FA Is Not Invincible

Organizations need to take responsibility for sensitive data. Every business should be using two-factor authentication (2FA) whenever possible.
July 17, 2019
Read More

Network Visibility

Cloud-based network visibility solutions are beginning to emerge on the market, making it possible to gain end-to-end network insights.
September 19, 2019
Read More


What can business leaders do to protect themselves from these Cybercrime-as-a-Service attacks? Here are five steps that can help reduce the risk.
August 23, 2019
Read More