People working at office

How to Identify Phishing Emails

You sign in to your work email and see you have an email from a colleague.    The message says they sent over some documents for you to review.    But you weren’t expecting any documents from them.    You open the attachments to view the documents because the sender’s name is someone you work…

Coworkers in office

What Is Zero Trust?

Zero Trust architecture is a modern approach to cybersecurity that many leading tech companies are using.    As the name implies, the Zero Trust model eliminates any implied trust throughout a cybersecurity network, requiring all users to verify their credentials regardless of where they are in relation to the network perimeter.     The way we…

busy man using a laptop

How to Stay Safe On Public Wifi

The increasing accessibility of the internet from every public space, from cafes to airports to resorts, ensures convenience and connectivity. You answer work emails while sipping hot coffee at your favorite coffee shop. You video call your buddy from the shop when you aren’t sure which sunglasses suit you better. Your partner asks if you’ve…

IT Consulting San Francisco Bay Area and Sacramento Valley - Types of Malware

How Ransomware Works

Introduction Cyberattacks are no longer a matter of if they will happen but when. For SMBs, an attack can easily knock out productivity and result in thousands of dollars in lost time and business. What makes the threat of a cyber-attack even more challenging for such companies is the limited IT resources on hand to…

team leader discussion with his member

What is SOC 2?

Introduction   If your organization provides services to external parties, those services can have an impact on those external users in areas like financial reporting or data security. Therefore, those external parties may need a guarantee that the controls of your services are designed and operating effectively. SOC audit reports provide these essential proofs about…

two man talking

How to Make Your Email HIPAA Compliant

HIPAA (the Health Insurance Portability and Accountability Act of 1996) is U.S. legislation created to improve healthcare standards. Covered entities (CEs) and their business associates (BAs) must be HIPAA compliant to protect the rights and privacy of patients and their protected health information (PHI). A HIPAA compliant covered entity fulfills HIPAA requirements by making a…