Featured Blog
Online Extortion Is the New Ransomware: Why Hackers Just Want Your Data
“It’s MUCH easier to steal data and threaten to leak it to the world, than to go to all the trouble of developing and deploying ransomware,” shared Matt Durrin, director of research and training for LMG Security. Attackers are increasingly bypassing encryption altogether and going straight for your data. Instead of locking down systems, they’re […]
Compliance, NIST CSF, Privacy
The NIST Privacy Framework: Should your Organization Use It to Manage Privacy?
Microsoft Office 365, Remote Work, Vulnerabilities
Microsoft Office 365 Security Best Practices to Protect Your Organization
Cloud, Remote Work, VDI security considerations