In this issue of Be Cyber Safe Happy St. Patrick’s Day a few days early! Here is what’s in this week’s Be Cyber Safe! In the next few weeks, we will unveil an exciting opportunity to empower your organization to improve cyber security through training. Look for more information shortly! Have a great weekend and […]
Triple Threat: Is Triple Extortion the Future of Ransomware?
You’ve probably heard of ransomware, but have you heard of triple extortion ransomware? Ransomware is a type of cybercrime where attackers use encryption to prevent users from accessing their sensitive data until a ransom is paid, which is often substantial. In recent months, we have written a lot about Double Extortion Ransomware. That’s when cyber […]
Be Cyber Safe for March 7, 2025
In this issue of Be Cyber Safe We are only seven days into March and we have had everything from 70 degrees and sunny to snow. I can’t wait to see what the rest of the month has to offer Here is what’s in this week’s Be Cyber Safe! In the next few weeks, we […]
Are Your Social Media Profiles Secure?
What’s the first thing you do when you join a new social media platform or create a new social media profiles a platform you are already on? Hopefully, the answer is to turn on specific security settings for your account. If you’re relying on the default security settings to keep safe, you could be at […]
Be Cyber Safe for February 28, 2025
In this issue of Be Cyber Safe We have all made it to the last day of February. This month has flown by, and it seems like it lasted six months. Here is what’s in this week’s Be Cyber Safe! In the next few weeks, we will unveil an exciting opportunity to empower your organization […]
The Unexpected Downfall: How a Wobbly Domino Led to Organizational Ruin
Have you heard about Okta? Even if you haven’t, you might still have been affected by the large-scale breach on their systems that rocked the tech community on October 19, 2023. Okta is a third-party service that provides organizations, like your own, for example, with multi-factor authentication, other secure biometric identification, and single sign-on tools. […]