Vishing, Smishing, and All the Other Strangely-Named Trends in Social Engineering

According to Interpol, social engineering scams cost businesses around the world a total of $1 billion in 2015. This figure […]

Read More

What Are Hackers Looking for When They Attack Small Businesses?

According to a study recently conducted by Verizon, 71% of all data breaches are carried out against small businesses with […]

Read More

A Brief Guide to Office 365 Business Subscriptions

One of the main advantages of cloud services and other subscription pricing models is that they allow businesses to enjoy […]

Read More

BYOD policies that will keep your business secure

Several years ago, a bring your own device policy (BYOD) may have seemed impractical to business leaders who balk at […]

Read More

How to Choose a Managed Services Provider

More companies are migrating to the cloud than ever before. The unprecedented scalability and flexibility of managed services allow businesses […]

Read More

How Does Data Encryption Work, and What Should You Apply It To?

Data encryption is one of the most important elements in any cybersecurity strategy, since it keeps data safe even if […]

Read More

How Dyrand Simplifies PIPA Compliance

The Personal Information Protection Act (PIPA) applies to all private-sector organizations operating in Canada. It explains the standards that businesses […]

Read More

How to Respond to a Ransomware Attack

Barely a month after the global WannaCry ransomware attack, a variation of the Petya malware stuck networks in both Ukraine […]

Read More

Technology System Must-Haves To Better Engage Mobile Employees

Having a mobile workforce offers tremendous benefits to businesses. Aside from boosting employee morale, being able to work from home […]

Read More