Are You On The Hook?

If you have an email address, you have probably been targeted by a phishing scam. These scams are everywhere, and they take many different forms. And while your spam filter may stop most of them in their virtual tracks, some will inevitably slip through the cracks. So, can you recognize the various forms of phishing?…

Read More
Port53 Leading the Culture Shift

New technologies and digital infrastructure are coming online every day, rapidly transforming the world we live in and creating new opportunities for businesses of all sizes to compete and innovate. Protecting these investments and the advantages they confer requires a far-reaching and ongoing commitment to cybersecurity. Emerging technologies like 5G, IoT and AI can be deployed to solve major global challenges and create a better world. Yet, they can still be exploited by malicious actors for financial gain, political motives, and other nefarious ends.

Read More
NIST Cybersecurity Implementation Tiers

NIST consists of three main components: Implementation Tiers, Framework Core, and Profiles. In this blog post we will cover the four NIST Framework Implementation Tiers; each of which describes the degree to which your organization’s cybersecurity risk management practices align to the characteristics defined in the framework.

Read More
What is the NIST Framework?

For as long as we can remember, smaller entities have been held accountable to the same security and compliance standards as enterprise sized organizations in their industry. From regional credit unions scrambling to comply with the same regulations as major banks like Wells Fargo and Bank of America to local “Main Street” merchants struggling with…

Read More
Don't Let Hackers Ruin Your Vacation!

You may be taking a vacation, but hackers are not. In fact, many hackers wait for times like this when security teams are likely to be short staffed because of vacations or holidays. Learn how to protect yourself and your company from a cyber attack while traveling.

Read More
What to Look for in a Cybersecurity Solution

When buying cybersecurity protection, small businesses face many choices.  What kinds of solutions are really needed?  How do you pick the right option?  Should you pick a cloud-based solution or something on-premise?  Pick the wrong solution and you may be under-protected, spending way too much money, or hopelessly bogged down with too many alerts or…

Read More
How Do You Respond to a Cyber Attack?

The Impact of a Cyber Attack The impacts of a cyber attack can be devastating to an SMB or mid-size company.  When an attack happens, you may not have access to business-critical systems needed to run your company. According to Cisco’s 2018 Security Capabilities Benchmark study, 40% of SMBs experienced downtime of 8 hours or…

Read More

The traditional ways of approaching IT security are no longer enough. When most IT was handled on-premises a comprehensive security strategy would involve securing your hardware and network, put in place the appropriate firewalls, protect yourself with a good antivirus software, regularly update all company approved software, and backup your data regularly. But Cloud Computing…

Read More
SMBs Face a Perfect Storm for Cybersecurity

What is a Perfect Storm? Wikipedia describes a Perfect Storm as an event in which a rare combination of circumstances drastically aggravates the event.   In other words, a worst-case scenario.  Today Cybersecurity presents small businesses with a Perfect Storm as they try to protect their IT environments. Hackers are increasingly focusing on SMBs (43% of cyber…

Read More