HTG Weekly Blog

 

1 min read

Understanding Insider Threats

Cybersecurity has increasingly emerged with these priorities as companies grapple with pandemic-inspired economic uncertainty, operational disruption, and business transformation. Several high-profile cybersecurity incidents drove news cycles,...

Read More

2 min read

Mitigate the Risks of Business Email Compromise Attacks

We know you've seen the headlines: Cyberattacks are hitting enterprises at unprecedented rates. And business email compromise (BEC) attacks, in...

Read More

3 min read

Do’s and Don’ts of SMB Cybersecurity

It's no secret that the COVID-19 pandemic has severely impacted small and medium-sized businesses (SMBs). While dealing with decreased foot traffic,...

Read More

1 min read

Cloud Services Can Be a Challenge for SMBs

Small to mid-sized businesses (SMBs) are turning to the cloud for numerous reasons.

Read More

2 min read

Making Authentication the Core of Email Security

The Zero Trust model is founded on a simple concept, "trust no one and nothing." In practical terms, organizations that adopt the Zero Trust model...

Read More

2 min read

Five Tips for Keeping Your Mobile Data Safe and Secure

Mobile security should be a top priority for any smartphone user. Phones have quickly evolved in recent years to store and share our most sensitive...

Read More

2 min read

Public Wi-Fi Can Make You Vulnerable to Hackers

The same features that make free Wi-Fi hotspots desirable for consumers make them desirable for hackers, namely, that it requires no authentication...

Read More

Winning With Cybersecurity

Harbor's Matthew Webster joins the Corvid Cyberdefense team to discuss how cybersecurity excellence can be a business advantage when bidding on...

Read More

2 min read

3 Ways Your Organization Can Protect Itself from a Ransomware Attack

Ransomware attacks continue to be serious threats, but the audacity, sophistication, and reach of the recent spate of attacks have moved from...

Read More

2 min read

Protecting Your Digital Supply Chain

When we think about cybersecurity, the digital defense systems, tools, hardware, and knowledge that fight cybercrime, we don’t often think about the...

Read More