Tipsheet: Protect Your Video Meetings

Tipsheet: Protect Your Video Meetings Service: Cloud Services Type: Tipsheet Employees around the globe started working from home during the COVID-19 pandemic. Many turned to programs like Zoom to meet online. However, cybercriminals see this trend as a new opportunity to attack people for profit. Therefore, you must protect these platforms, so your company is safe from…

Business Email Compromise Tip Sheet

Business Email Compromise Tip Sheet Service: Security as a Service Type: Tip Sheet Businesses need to be on the lookout for impersonated business emails. Cybercriminals can pretend to be a trusted party, such as a company executive, and request funds or documents with personally identifiable information. Business Email Compromise (BEC) attacks are tougher to detect…

Travel Cyber Security Checklist

Travel Cyber Security Checklist Service: Security as a Service Type: Checklist You may be planning your season travel, whether it is for business or pleasure. Many travelers take safety precautions by putting padlocks on their suitcases, wearing money belts, and storing credit cards in RFID-blocking wallets. However, you should also include device cybersecurity in your…

Work from Home Tool Checklist

Work from Home Tool Checklist Service: Managed IT Services Type: Checklist Working from home is a unique opportunity for your trusted employees to get more work done. To make the situation work for your company, these employees need to use physical and virtual tools to maximize efficiency. Our downloadable lists tools you will need in…

Disaster Recovery Plan Checklist

Disaster Recovery Plan Checklist Service: Backup as a Service Type: Checklist A disaster recovery plan defines instructions for how an organization functions after sustaining significant data loss. In today’s business world, losing data can be catastrophic, which is why having a well-executed disaster recovery plan is essential for any business. This checklist can help your…