Blogs
Why is Ransomware the Most Expensive Cybersecurity Breach?
Dec 9, 2021
When the internet developed into a sophisticated platform, it gradually evolved over time into a platform being exploited by cybercriminals. These cybercrimes preyed on people’s vulnerability to schemes especially when it involves winning money or downloading from...
Increase Workplace Confidence and Productivity with World-class Cybersecurity
Nov 30, 2021
Is it really possible to increase workplace confidence and productivity when you invest in world-class cyber security measures? Nobody likes it when people mess with their stuff. No one also likes it when there’s someone constantly looking over their shoulder...
What is Ransomware?
Nov 16, 2021
In 2021 alone, there were 10 massive ransomware cases that cost businesses millions of dollars in losses. Are you going to allow yourself to fall victim to cybercriminals and be a statistic? Then get the services of a cyber security consulting company that has the...
Cybersecurity Special: Firewalls – Aren’tThey All the Same?
Oct 28, 2021
As we are nearing the end of Cybersecurity Month, we saved one of our favorite topics for the grand finale. And the exciting subject is… FIREWALLS! Firewalls have been around for decades and their primary purpose is to block network and data traffic based on rules. ...
Cybersecurity Special: Multi-factor Authentication – Complex Passwords Are NOT Enough Anymore!
Oct 22, 2021
It was not long ago when a complex password would be enough to protect our accounts and systems. Starting about 10 years ago, when more systems were cloud-based and remote access to businesses became more popular, a strong password just would not be enough. All the...
Cybersecurity Special: Endpoint Protection with DNS Filtering – Simple and Cost-Effective Protection
Oct 19, 2021
In an earlier cybersecurity newsletter, we discussed EDR (Endpoint Detection and Response) solutions and the benefits of traditional endpoint protection. Clearly, EDR is the more advanced solution, but the downside of that path is the ongoing and increased costs on a...
Cybersecurity Special: How Secure is your Company Data and is your Backup Disaster Recovery Plan still PROPERLY Protected?
Oct 14, 2021
First, sorry for getting nostalgic with some of these cybersecurity special messages, but when I see the word “backups,” I get excited and it reminds me of Veritas, which was the original server backup software that CTS implemented over two decades ago. I remember...
Cybersecurity Special: Employee Testing and Training for Phishing Attacks
Oct 12, 2021
There are two types of “fishing” – the good and the really bad. Let’s start with the good, which is when you are chilling on a boat on a warm summer day, kicking back with your buddies, and having some beers. Unfortunately, we won’t be discussing that one in this...
Cybersecurity Special: EDR (Endpoint Detection and Response) – Today’s New Virus Protection
Oct 8, 2021
While I realize I’m dating myself, I remember when the first virus protection was released back in 1987. The name of the product (which is still used today) is McAfee (started by John McAfee). Soon after that, a man by the name of Peter Norton came on the scene with...
Cybersecurity Special: Security Audits – Importance of Discovery and Remediation
Oct 5, 2021
Given our human nature, we all believe that we are safe, secure and nothing is going to happen. We believe that we are all doing what is necessary to keep ourselves and our businesses out of harm’s way. The reality is that when it comes to cybersecurity, you can...