Blog

Information + Technology

Fixing Your Weakest Link: Your Employees

You can have every piece of security hardware in the books: firewall, backup disaster recovery device, anti-virus; but your employees will still be the biggest vulnerability in your organization when it comes to phishing attacks. How do you mitigate as much risk as possible? Create and Strictly Enforce a Password Policy: Passwords should be complex, randomly generated, and replaced regularly. In…

What Is Phishing & How Are Hackers Using It?

While the number of people falling for sending personal information to the crown prince of Nigeria in hopes of receiving his promised wealth and riches seems to be dropping, phishing remains a major issue. In fact, the number of phishing campaigns pursued by hackers around the world increased 65% in the last year. What exactly is phishing? Hackers mimic the emails,…

4 ways cybercriminals use social engineering to steal your data

Social engineering is yet another tactic cybercriminals use to steal data from an unsuspecting company. However, this tactic is slightly different than typical methods, mainly because it preys on the human element. Here are a few of the most common ways social engineering could play out in your business. 1. They could send an email. The majority of people are…

Catalyst One Day leadership event

Catalyst is a community of leaders that equip, challenge and bring people together through events, online resources, media and outreach programs. The GoSummIT team recently attended the Catalyst One day event here in Orlando and we couldn’t be more excited about it. We were honored to have speakers and respected leaders Andy Stanley and Craig Groeschel, who challenged us to…

Start typing and press Enter to search