Monthly Newsletter - August 2025 Security Newsletter
Critical infrastructure is so seamlessly integrated into our daily routines that we often don’t notice it until something goes wrong.
In this month's newsletter we’ll explore the hidden connections between cybersecurity and critical infrastructure and how you play a vital role in protecting the systems we all rely on.
Weekly Security Tip - Critical Infrastructure: Advanced
Cyber hygiene is a foundational first line of defense, and just like any other physical structure relies on a solid foundation, so does critical infrastructure.
In this week's Micro Training, we'll take a look at how the world’s most targeted and essential industries prioritize cyber hygiene, and what other industries can learn from their best practices.
Weekly Security Tip - Critical Infrastructure: Intermediate
In last week's video, we covered the foundations of cyberattacks on critical infrastructure.
In this week’s Micro Training, we’ll take a closer look at the specific methods attackers use to compromise these vital systems.
Weekly Security Tip - Critical Infrastructure: Beginner
In today’s hyperconnected world, protecting critical infrastructure—our most essential systems and services—is more important than ever.
In this week’s Micro Training, we’ll explore the vast scale of critical infrastructure and uncover why these systems are so often targeted in cyberattacks.
Monthly Newsletter - July 2025 Security Newsletter
As technology continues to miniaturize and integrate seamlessly into our daily lives, wearable devices are collecting, transmitting, and storing sensitive personal data—often without much scrutiny.
Weekly Security Tip - Wearables: Retire Yours the Right Way
Many of us have wearable devices that we use every day, but eventually these devices will have to be retired.
Weekly Security Tip - Wearables: Breached and Exposed
Ever wonder what really happens during a wearable device breach—or how attackers can use compromised devices against you?
Weekly Security Tip - Wearables: How Yours Could Be Infiltrated
Did you know your wearable device could be silently connecting to Bluetooth devices and Wi-Fi networks you never approved of?
Weekly Security Tip - Wearables: What Makes Wearables Risky
Smartwatches, fitness trackers, and other wearables are more than health tools — they’re internet-connected devices that can expose personal and work data if not secured.
Monthly Newsletter - June 2025 Security Newsletter
Organizations are using AI to detect threats faster. At the same time, cybercriminals are harnessing AI to launch more convincing attacks.
Weekly Security Tip - Shadow IT
By now, you’re familiar with the basics of shadow IT, and you’ve heard the risks.
In this week's Micro Training, dive deeper into our three-parts shadow IT series, exploring the role of software as a service (SaaS) and how it fuels the rise of shadow IT.
Weekly Security Tip - Shadow IT
Shadow IT isn’t just about someone downloading a random app, it’s often a response to unmet needs.
In this week’s Micro Training, learn what drives shadow IT and how understanding the "why" behind it can help strengthen your organization’s security.
Monthly Newsletter - May 2025 Security Newsletter
Cybercriminals are no longer relying on loud, disruptive attacks to make an impact.
In this month's newsletter, we uncover the hidden dangers lurking in networks and explore strategies needed to strengthen security against unseen threats.
Weekly Security Tip - Cryptojacking Case Study
From pirated software to massive botnets, cryptojacking attacks are happening every day—and they’re getting smarter.
Weekly Security Tip - Cryptojacking Prevention
ou don’t need to be an expert to stop cryptojacking—just a few smart habits and tools can do the trick.
In this week's Micro Training, learn practical steps to block cryptojacking attempts and what your IT provider can do to help keep your system clean and efficient.
Weekly Security Tip - - How Crytpojacking Works
Think cryptojacking is easy to spot? Think again. These stealthy attacks can go unnoticed for months.
In this week's Micro Training, get a deeper look into how cryptojacking scripts are delivered, the warning signs to look for, and why this sneaky scam costs more than you think.
Weekly Security Tip - Cryptojacking Fundamentals
Your device might be working overtime, and not for you. Cryptojacking is when cybercriminals secretly use your system to mine cryptocurrency.
Monthly Newsletter - April 2025 Security Newsletter
What if you could think like a hacker and recognize their methods before they strike?
In this month's newsletter, learn more about how these criminals operate in order to stay one step ahead of their schemes.
Weekly Security Tip - Fileless Attacks
Have you ever noticed your computer running more slowly, crashing randomly, and just behaving strangely? Fileless malware could be the culprit.
Weekly Security Tip - TOAD Attacks
Scammers are constantly evolving their tactics, and telephone-oriented attack deliveries (TOADs) are a prime example. These attacks combine phone calls and emails to deceive users into revealing sensitive information or installing malware.