Resources and insights
The latest industry news, interviews, technologies, and resources.

May/June ‘24 Cybersecurity News Roundup: RAT Malware & Vulnerabilities Target Network Security
Krista Lyons
5 minute read

Summer Cybersecurity Roundup: Microsoft Vulnerabilities, CrowdStrike Outage
Krista Lyons
7 minute read

CrowdStrike Update Causes Global Microsoft Outages: What You Need to Know
Krista Lyons
3 minute read

April ‘24 Cybersecurity News Roundup: Brute Force Attacks & Vulnerabilities on VPNs & SSH
Krista Lyons
8 minute read

2FA vs. MFA: What’s the Difference?
More than 15 billion leaked credentials were available for sale online in 2024 — which means there is a solid chance that at least a few of your employees have information that has been compromised. Authentication plays a pivotal role in ensuring the security of sensitive data, systems, and networks, but only when it makes access more difficult
Krista Lyons
4 minute read

Secure Your Business: Access Control Policy Templates & Best Practices
If you’re still in the startup stage, you may be tempted to allow open access for all resources to all employees. But as your team grows, your attack surface widens, making your business more appealing to bad actors. That’s where an access control policy template comes in.
Krista Lyons
13 minute read

Creative MFA Setup Messages to Boost Employee Adoption
Multi-factor authentication, MFA, is not new — but it does often get on your employees’ nerves. How many times have you heard someone complain about having to open Google Authenticator on their phone? Don’t even get us started on Microsoft authenticator complaints. But what if you could reframe MFA for your employees to make it less of a hassle?
Krista Lyons
6 minute read