Skip to content

Zoom – A Cautionary Tale in Remote Working

We’ve talked about how the rapid pivot to remote work has introduced a tremendous amount of new cybersecurity risks to companies. Teleconferencing has become an absolute necessity and some of the more popular teleconferencing applications have ran into widespread issues due to being overwhelmed by the volume of users. This has opened the door for… Read More »Zoom – A Cautionary Tale in Remote Working

Covid-19 – Business Continuity Management

Businesses all across the country are facing serious disruptions due to the effects of the Coronavirus. Companies are all still grappling with the myriad of issues the pandemic has caused, including how to ensure the security of sensitive data, systems and proprietary processes. Many companies simply were not prepared for the challenges this crisis presented… Read More »Covid-19 – Business Continuity Management

Coronavirus: Working from Home Cybersecurity Tips

The widespread disruption caused by the coronavirus pandemic is hitting small and medium sized businesses hardest. Workers across the world are now working remotely at a scale never before seen. This of course brings challenges but also vulnerabilities. With staff out of the office, there is much less control over your cybersecurity. In your office… Read More »Coronavirus: Working from Home Cybersecurity Tips

Hackers Profiting Off Coronavirus with Phishing E-mails

Bad actors online love to prey on tragedy and fear to make a profit. Unfortunately, it seems as though coronavirus is no exception, and there are phishing emails circulating designed to capitalize on the worldwide pandemic. With the world in a panic, everyone should be even more vigilant when it comes to cybersecurity than ever.… Read More »Hackers Profiting Off Coronavirus with Phishing E-mails

“Protecting Taxpayer Data is the Law” – IRS Publication 4557

Your average hacker isn’t looking to take down Goldman Sachs; most hackers are just looking for easy wins. Easy wins mostly only require easy targets, and luckily for hackers everywhere, there are plenty of easy targets to choose from. CPA firms are particularly vulnerable which is why the IRS released Publication 4557, to explain the… Read More »“Protecting Taxpayer Data is the Law” – IRS Publication 4557