Entries by

Is Your Company Ready for a Cyberattack?

Is Your Company Ready for a Cyberattack? Can you ever be ready for a cyberattack—yes, you can! Asking if you are ready for a cyberattack is like asking if you are ready for an accident. When an accident occurs, you can have insurance and the coverage you need to take care of the problem—with a […]

Combatting Business Email Compromise Risks 

Combatting Business Email Compromise Risks  An old scam that keeps reinventing itself with new victims. Don’t become one!  You’ve probably heard the classic business email compromise (BEC) scam about Nigerian princes who want to deposit money in people’s bank accounts—but first need their prey to send them money to make it all work to plan. It’s an oldie but goodie. Unfortunately, it’s also one that keeps reinventing itself along with another […]

What is CMMC?

What is CMMC? The Cybersecurity Maturity Model Certification (CMMC) is a program developed by the Department of Defense (DoD) to help measure the cybersecurity maturity level of contractors across the defense industrial base (DIB), which includes over 300,000 companies. The CMMC is the DoD’s response to significant increase in compromises of sensitive data located on […]

Cast! A Deep Dive Into Phishing

Join our 3 in-house cybersecurity panelists for a virtual discussion on phishing We’ve assembled a panel of cybersecurity experts to discuss and answer your questions about phishing. From examples of phishing emails to how to train your employees on how to identify phishing, they’ve got you covered. Event details Location: Virtual live event hosted on […]

Why should an organization consider using a security framework?

Why should an organization consider using a security framework? Historically, organizations have invested significant amounts of time and budgets into their current security posture.  Up until recently, that posture was largely designed to protect the traditional office space.  With more people working remotely than ever, that security posture and program may not fit with the […]

Break the Cyber Threat Cycle Part II

Start out with Part I of this series Prevent the initial reconnaissance and attack with an effective advanced threat protection and email encryption solution coupled with enforcing multi-factor authentication for user logins. 97% of users are still not able to detect a sophisticated phishing attack. SolarWinds is just another reminder that email continues to be […]

Break the Cyber Threat Cycle Part I

Break the Cyber Threat Cycle with Zix Layered Protection Part I Achieving robust security does not have to be hard work. However, with the multitude of ways organizations are targeted, coupled with the hundreds of security companies pitching different approaches, choosing and implementing the right security solution can be daunting. Endpoint security vendors will highlight […]

Can HIPAA Information Be Emailed?

Can HIPAA Information Be Emailed? According to the CDC: “while the HIPAA Privacy Rule safeguards protected health information (PHI), the Security Rule protects a subset of information covered by the Privacy Rule. This subset is all individually identifiable health information a covered entity creates, receives, maintains, or transmits in electronic form. This information is called […]