Is Your Company Ready for a Cyberattack? Can you ever be ready for a cyberattack—yes, you can! Asking if you are ready for a cyberattack is like asking if you are ready for an accident. When an accident occurs, you can have insurance and the coverage you need to take care of the problem—with a […]
About Kelsey Sarff
This author has yet to write their bio.
Meanwhile lets just say that we are proud Kelsey Sarff contributed a whooping 26 entries.
Combatting Business Email Compromise Risks An old scam that keeps reinventing itself with new victims. Don’t become one! You’ve probably heard the classic business email compromise (BEC) scam about Nigerian princes who want to deposit money in people’s bank accounts—but first need their prey to send them money to make it all work to plan. It’s an oldie but goodie. Unfortunately, it’s also one that keeps reinventing itself along with another […]
What is CMMC? The Cybersecurity Maturity Model Certification (CMMC) is a program developed by the Department of Defense (DoD) to help measure the cybersecurity maturity level of contractors across the defense industrial base (DIB), which includes over 300,000 companies. The CMMC is the DoD’s response to significant increase in compromises of sensitive data located on […]
Not All MFA is Created Equal: Advantages and Disadvantages of Common Forms of MFA If you’ve spoken to anyone in the cybersecurity industry in the past few years, you’ve probably heard at least once “multi-factor authentication (MFA) is one of the best things you can do to protect yourself and your organization.” But what, you […]
Join our 3 in-house cybersecurity panelists for a virtual discussion on phishing We’ve assembled a panel of cybersecurity experts to discuss and answer your questions about phishing. From examples of phishing emails to how to train your employees on how to identify phishing, they’ve got you covered. Event details Location: Virtual live event hosted on […]
Why should an organization consider using a security framework? Historically, organizations have invested significant amounts of time and budgets into their current security posture. Up until recently, that posture was largely designed to protect the traditional office space. With more people working remotely than ever, that security posture and program may not fit with the […]
Reflecting on the recent SolarWinds breach and exploitation of the Microsoft Exchange 0-day, the associated threat actors started from the beginning of the Cyber Threat Cycle. They needed to run reconnaissance to identify the right target and instigate the initial attack. This is key to the first part of Zix Layered Protection. Preventing the initial […]
Start out with Part I of this series Prevent the initial reconnaissance and attack with an effective advanced threat protection and email encryption solution coupled with enforcing multi-factor authentication for user logins. 97% of users are still not able to detect a sophisticated phishing attack. SolarWinds is just another reminder that email continues to be […]
Break the Cyber Threat Cycle with Zix Layered Protection Part I Achieving robust security does not have to be hard work. However, with the multitude of ways organizations are targeted, coupled with the hundreds of security companies pitching different approaches, choosing and implementing the right security solution can be daunting. Endpoint security vendors will highlight […]
Can HIPAA Information Be Emailed? According to the CDC: “while the HIPAA Privacy Rule safeguards protected health information (PHI), the Security Rule protects a subset of information covered by the Privacy Rule. This subset is all individually identifiable health information a covered entity creates, receives, maintains, or transmits in electronic form. This information is called […]
We Put People First
We are CIT – a people-first I.T. company that cares about how you use technology, not just the technology itself. Discover how we’re different.