Glen Willis

Email app symbol on a phone or computer screen.

Outsmarting the hackers behind today’s Business Email Compromise attacks

Business Email Compromise (BEC) campaigns have become increasingly prevalent and costly, with the FBI estimating global annual losses in the billions of dollars. This sophisticated form of cybercrime targets organizations by exploiting email systems to deceive employees and manipulate them into performing unauthorized transactions or divulging sensitive information.   Understanding the mechanisms of BEC and implementing […]

Outsmarting the hackers behind today’s Business Email Compromise attacks Read More »

5 sure-fire strategies for achieving a reasonable cybersecurity baseline

Strategies for achieving a cybersecurity baseline

The cybersecurity industry offers an abundance of high-quality, constructive guidance for organizations. Although this is something to be celebrated, it can also be overwhelming for business and technology leaders who are grappling with the following questions: How to determine if the organization’s current cybersecurity posture is good enough? How to establish the right priorities within

Strategies for achieving a cybersecurity baseline Read More »

Your future is secured when your business can use, maintain, and improve its technology

Request a free consultation