CSU Blog
The Benefits of Hiring a Document Management Company for Your Business
You need to understand that there are limits to what you can do if you must thrive in your industry. This will help you insist on doing certain tasks as well as outsourcing some to companies or professionals better at rendering the service. This simply means there are...
Common Phishing Tactics and How to Defend Your Business
Phishing attacks are one of the biggest and most common cybersecurity challenges companies and people face. It is an unfortunate online con game spearheaded by tech-savvy identity thieves and con artists. Phishers use email messages, malicious websites, spam and...
Security Awareness – a Generation Behind
Organizations around the world provide security awareness training for their employees. Normally this is provided for new starters and then a refresher every 12 months or so, to ensure that their employees are able to access corporate systems and applications without...
Guest Blog: Commentary on the Colonial Pipeline Breach by John Rouffas
The Colonial Pipeline ransomware attack is front page news across every cyber security outlet. There are many that have commented on the breach itself and the impact of that breach which is felt not just in the United States through lack of fuel supply, but a...
Guest Blog from CyberHive: The Legacy of the “SolarWinds” Hack: How do we protect against supply-chain cyber-attacks?
By Alan Platt, COO and Co-founder, CyberHive. Much information has been published already about the highly sophisticated “SolarWinds” cyberattack that was uncovered in December 2020. Attackers managed to access highly secure infrastructure in 18,000...
World Password Day 2021: Are Passwords Still the most Effective Security Measure?
The concept of a password has existed for millennia. And while the idea of them has remained the same, our use has not. A password no longer has to be a word, for example. But taking all into account, the password has remained very similar over the ages. That is now...