7 Ways to Improve Your Network Security
Here are 7 ways to improve your network security. First – Mandate Use of Multifactor Authentication (MFA)Multi-factor Authentication (MFA) is an authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN. MFA is a core component of a […]
What is Continuous Vulnerability Scanning
What is Continuous Vulnerability Scanning? Find your weaknesses, before the hackers do!Intruder is an online vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches. Stunningly easy, blisteringly powerfulEnjoy the same level of security as big banks and governments worldwide, without the complexity Monitor risk across your stackScan your publicly […]
Why Do You Need Cybersecurity Training for Employees
Why do you need cybersecurity training for employees?Cybercriminals are diligent in finding new, sophisticated methods to trick unsuspecting individuals into putting themselves at risk. Having a proactive approach is key in a robust security culture and our Employee Vulnerability Assessment is just the tool you need to help defend your clients’ weakest links. Why do you […]
What is a Managed Services Provider MSP
What is a Managed Services Provider MSP?What is a Technology Solutions Provider? These are questions as a small or medium-sized business finds themselves looking for answers to. We are here to help. What is a Managed Services Provider MSP? A managed service provider (MSP) delivers services, such as network, application, infrastructure, and security, via ongoing and […]
Be Aware of Black Friday Scams
Be Aware of Black Friday Scams Don’t Be Scammed By a Turkey It’s Thanksgiving week and that also means that the holiday season has officially started for most of us. And just the holiday season of our youth, as in summer vacation from school, this is the time of year when we as adults tend […]
Top Security Risk – Humans
Industry-first Employee Vulnerability Is Your Business Mitigating It’s Top Security Risk – Humans? We all have employees that have made mistakes at one time or another. Maybe they had an overwhelming schedule that caused them to slip up, or maybe they simply typed in an email address incorrectly and hit send. No matter […]
Best Security Implementing MFA
Best Security Implementing MFA. It is one simple action you can take to prevent 99.9 percent of attacks on your accounts. The simple action is enabling Multifactor Authentication. Last month I emailed our clients about the risk of Business Email Compromise on your Global Admin accounts, but in reality, it can happen to any account. […]
3 No-Hassle Cyberattack Prevention Methods
3 No-Hassle Cyberattack Prevention Methods Implementing Cyberattack Prevention methods within your organization can be overwhelming if you’re new to the concept, which is why most companies turn to a Managed Services Provider (MSP) for assistance. In addition to utilizing an MSP, you can also do a few things to provide a better layer of protection […]
Phishing: Simple ways to Keep Phish OFF the Menu
Phishing We recently posted this video to highlight common phishing attempts as the human element remains one of the most critical focus areas for preventing a data breach. You see them in your inbox all the time….scammers use email or text messages in an attempt to trick you into giving them your personal information. They may try […]
Ever Been Caught Phishing?
Even the IT People Can Be Caught Phishing Our company provides cybersecurity training. I often find myself skeptical of emails that look suspicious. I have a great track record of identifying these or at minimum erring on the side of caution. But even the best can find an email convincing. In this case, depending on […]
Cybersecurity Podcast: Cyber Hygiene
Cybersecurity Podcast: Cyber Hygiene Learn about Cyber Hygiene in this next episode of our Cybersecurity Podcast with Bill Hammelman and Terry O’Connor. https://www.youtube.com/embed/Si7RzqN5lu4 Cyber Security Podcast: Cyber Hygiene September 15, 2022 · 10mins Hello, everybody. I’m Terry O’Connor with O’Connor Insurance Associates. And again today, I’m with Bill Haleman with CCP. How you doing today, […]
Cybersecurity Podcast: Phishing 101
Cybersecurity Podcast: Phishing 101 How well do you know the latest tricks that today’s scammers are using? How about Spear phishing? Whaling? Deceptive phishing? Phishing? Smishing? Farming? In order to keep up with high-tech scammers, you should keep up with constantly evolving high-tech scams. In this podcast, we provide listeners with a few key tips […]
Cybersecurity and Cyber Insurance Podcast Episode 1 Released
Cybersecurity and Cyber Insurance Podcast Episode #1: Is Your Company Adequately Protected from a Breach? We recently published Episode 1 of our podcast “Cybersecurity: A series for local businesses and organizations” produced by CCP’s Bill Hammelman and Terry O’Connor, CIC, of O’Connor Insurance Associates, Inc. Check it out and be on the lookout for Episode #2 which […]
Remote Working Safety Tips
Remote Working Safety Tips Working remotely has many benefits but also creates many cybersecurity risks. Here is a handy list of do’s and don’ts to help you protect your company and sensitive information. Read & acknowledge your company’s Remote Work and Bring your Own Device (BOYD) policies and procedures. Avoid using your personal device […]
Smishing – How to avoid Smishing?
Smishing In recent years, hackers have moved away from traditional mediums like email. Instead, mobile phishing is their new approach, and they are targeting services like SMS, WhatsApp, Facebook, and fraudulent mobile apps. Research has found that mobile users are more likely to fall for phishing attempts compared to their desktop-using counterparts. The massive use of smartphones, […]