5 Tips to Combat Phishing Attacks

October 11, 2022

5 Tips to Combat Phishing Attacks

In honor of National Cybersecurity Awareness month, Sayers will be releasing a series of short videos focused on various cybersecurity topics. In this episode, I’d like to provide you with some steps to identify and combat phishing attacks. When a social engineering attack occurs, the attacker uses human interaction (typically via social skills) to obtain or compromise […]
Read more
October 05, 2022

Identity & Access Management: The 3 Pillars of IAM

In honor of National Cybersecurity Awareness month, Sayers will be releasing a series of short videos focused on various cybersecurity topics. In this episode, I’d like to provide you with an overview of Enterprise Identity and Access Management (IAM). Identity and Access Management, often referred to as IAM, are the structures and processes within an […]
Read more
September 29, 2022

Cybersecurity Asset Management: Know What to Protect

Author: Chris Cochran  Chris is Creative Director and Cybersecurity Advocate at Axonius, co-founder of Hacker Valley Media, and producer/host of the award-winning Hacker Valley Studio Podcast. Chris has extensive experience building and running strong cybersecurity and content programs. For more on the topic of cybersecurity asset management, watch the 17-minute “Bridging the CAASM” session presented by Chris […]
Read more
April 13, 2022

Be Cyber Secure: Prepare Now for Online Threats (2024)

It’s very difficult to predict where the next cyber attack may come from, and in what form. A cyber threat to critical IT infrastructures, financial systems, and transportation channels can cause immense damage to a population. The current media coverage of warring nations is a stark reminder to corporations and organizations that there has, and […]
Read more
March 31, 2022

Recovery Solutions to Reduce Ransomware Risk

It’s no secret that hackers and data thieves are becoming more creative with their breaching efforts. Whether it’s a cleverly disguised phishing email or troublesome malware, data thieves constantly look for new ways to get sensitive information.   Another technique that is used quite often by these thieves is ransomware. According to the New York Times, ransomware […]
Read more
March 08, 2022

Cloud Security: Where Should We Start?

Major cloud solution providers including Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP) have steadily added functionality to make their features more secure. But can they say their clouds are truly secure by default? If you think of the cloud as fundamentally an operating platform, it’s typically much more sophisticated than a […]
Read more

    Addresses

  • Atlanta
    675 Mansell Road, Suite 115
    Roswell, GA 30076
  • Boston
    25 Walpole Park South, Suite 12, Walpole, MA 02081
  • Rosemont
    10275 W. Higgins Road, Suite 470 Rosemont, IL 60018

 

  • Bloomington
    1701 E Empire St Ste 360-280 Bloomington, IL 61704
  • Chicago
    233 S Wacker Dr. Suite 9550 Chicago, IL 60606
  • Tampa
    380 Park Place, Suite 130, Clearwater, FL 33759

Have a Question?

Subscribe Contact us