Cybersecurity

The Secret History of Cybersecurity Awareness Month (And its Not-So-Secret Future)

Have you ever wondered where all those weird holidays come from? Like, who got to decide that April 23 was National Talk Like Shakespeare Day? Or that Squirrel Appreciation Day would fall on January 21? Or that the last Friday of every April would be National Hairball Awareness Day? An entire day to make sure […]

The Secret History of Cybersecurity Awareness Month (And its Not-So-Secret Future) Read More »

Beware of unemployment scams

The pandemic creates many opportunities for online scams, including targeting those who are unemployed. Since the enactment of the Coronavirus Aid, Relief, and Economic Security Act (CARES Act), identity theft is on the rise as scammers seek to access lucrative unemployment benefits. Capturing personal information to file a fraudulent unemployment claim is easier than ever. Indiana

Beware of unemployment scams Read More »

Create a BYOD policy to protect company data

More companies are starting to embrace BYOD, also known as Bring Your Own Device programs. This initiative is expected to be valued at $366.95 billion by as early as 2022. According to Gartner, 30 percent of IT organizations will expand BYOD to other “enhancements” such as physical augmentation (ex: smartwatch) by 2023. Without a clear policy,

Create a BYOD policy to protect company data Read More »

Outsmart hackers: Protect your password

Passwords are the gateway to your company’s important documents, which makes it critical to protect them from hackers. As more businesses continue to work remotely, it’s important for CIOs to enforce password updates to keep company information secure. Troy Holwerda, President of Proxurve Solutions, explains how password protection strategies improve cybersecurity.  Announcer: I’m here with

Outsmart hackers: Protect your password Read More »

Small businesses are a target for hackers

Small businesses are a favorite of hackers. In fact, cyberattacks cost companies $200,000 on average, often putting them out of business. Troy Holwerda, President of Proxurve Solutions, discusses solutions for small businesses to keep hackers from accessing company data. Announcer: Troy, why do you think small businesses are a favorite target of hackers?  Troy: I

Small businesses are a target for hackers Read More »

CyberSecurity Breach from the Headlines: a Cautionary Tale

[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.22″][et_pb_row admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text admin_label=”Text” _builder_version=”4.4.6″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”] Ripped from the headlines (Law & Order-style): Hackers Strike Law Firm of Madonna, Lady Gaga and Other Celebrities So how does a story like this impact YOUR security perspective (for your organization)? If it doesn’t, it should.

CyberSecurity Breach from the Headlines: a Cautionary Tale Read More »

Quick Tips to Spot a Phishing Scam

[et_pb_section fb_built=”1″ _builder_version=”4.3.2″][et_pb_row column_structure=”3_5,2_5″ _builder_version=”4.3.2″][et_pb_column type=”3_5″ _builder_version=”4.3.2″][et_pb_image src=”https://www.proxurve.com/wp-content/uploads/2020/05/BPP1.png” _builder_version=”4.3.2″][/et_pb_image][/et_pb_column][et_pb_column type=”2_5″ _builder_version=”4.3.2″][et_pb_text _builder_version=”4.3.2″ hover_enabled=”0″] Click here to view a few quick tips to spot a phishing scam. [/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]

Quick Tips to Spot a Phishing Scam Read More »

Free Cybersecurity Training

[et_pb_section fb_built=”1″ _builder_version=”4.3.2″][et_pb_row _builder_version=”4.3.2″][et_pb_column type=”4_4″ _builder_version=”4.3.2″][et_pb_text _builder_version=”4.3.2″ hover_enabled=”0″] Get access to free security training, a free dark web scan and one free simulated phishing attack. Click here to find out more and sign-up. [/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]

Free Cybersecurity Training Read More »