FEATURED BLOG
Cybersecurity Framework Assessments: Prioritizing Your Remediation
Cybersecurity framework assessments often reveal numerous gaps, leading to a need for prioritization. This blog explores how to rank and address these issues based on risk analysis, business objectives, and available resources.
The Smish-and-Grab – Latest SMS & Phishing Trends in 2024
Cybercriminals are turning to smishing—deceptive texts targeting sensitive info. Discover the growing threat and key strategies to safeguard your data from these clever attacks.
Creating Better Passwords
Funny thing about passwords. They better they are, the more we hate them. In the constant struggle for security, IT faces off with users in the battle for a secure corporate enterprise. Taliy offers some practical advice you can implement today to improve your password enhancement adoption across the organization.
Multifactor Authentication and You
Matt Barnett and Founder and CEO of Cyberblack, Brett Hodges, analyze the Colonial Pipeline attack in the weeks since the massive shutdown caused fuel prices to surge and incited panic buying across the country. This episode of the 7X Files digs into what we can learn from this attack and what can you do to ensure your organization isn’t the next victim.