CyberLog

Informative articles on Cybersecurity, IT Services, and cyber threats as they relate to small and medium size companies.

Matthew Connor

Data Leak Prevention: Strategies to Safeguard Sensitive Information

You’ll remember that in 2021, Facebook came under fire for one of the biggest data leaks in...

Read more
Matthew Connor

Spam vs Phishing: Key Differences and How to Protect Yourself

Every click, every email, every apparently innocent interaction online can be a gateway for...

Read more
Matthew Connor

Whaling Phishing: 5 Tips To Secure Your Business

Whaling phishing is a growing danger, targeted squarely at your company's most important...

Read more
Matthew Connor

Data Exfiltration: How Hackers Steal Sensitive Information

Cybercrimes are escalating at an alarming rate. Studies suggest that more than 800,000 ransomware...

Read more
Matthew Connor

Are Managed IT Solutions Actually Worth It?

Running a business means juggling endless tech challenges. You know it's time to scale up and...

Read more
Matthew Connor

Threat Management: Issues and Best Practices

The digital revolution opened the door to an era of unparalleled connectivity, but it has also...

Read more
Matthew Connor

The Importance of Cyber Background Checks

If you run a business, you might feel stressed by the challenge of dealing with cyber threats and...

Read more
Matthew Connor

What is Network Penetration Testing and How Does it Work?

On average, a hacker attack is reported every 39 seconds. Each year, the number of data breach...

Read more
Matthew Connor

The Benefits of Dark Web Monitoring Services for Cyber Threat Intelligence

Dark web monitoring services are becoming increasingly popular with businesses that take data...

Read more