Resources

Resources

Work From Home Tips
Working remotely, whether short-term or permanent comes with many perks, but it also poses many new risks for the security of your organization’s data. We’ve developed a list of guidelines and tips to assist you as you prepare to work from home in a safe, functional work environment. more

Phishing Email Analysis Training
Keep the breach out of reach with our Email Analysis Training Tool! more

Dark Web Monitoring
The Dark Web is an area of the internet that is not visible by using search engines, but instead requires special software to gain entry. The Dark Web is known for its anonymity, a place where criminals can buy and sell nearly anything. more

Microsoft Office 365 SaaS Protection
With more and more businesses depending on Office 365 for collaboration and business operations, the risk of potential data loss is impossible to ignore. Although data is stored on Microsoft servers, Microsoft does not take responsibility for data loss that occurs on the client’s side. more

Ransomware Response Checklist
Ransomware encrypts/blocks your data until a ransom is paid. It comes in many variants (such as CryptoLocker, Petya, and WannaCry) but it’s constantly evolving, making it very difficult to protect against.

So what should you do if you are hit by ransomware? Check out our checklist to ensure you are taking the right steps. more

Secure Password Management
Did you know that more than 30% of employees keep track of passwords by writing them on Post-it Notes? Did you also know that more than 60% of all data breaches result from weak or stolen passwords?

So, how do you adopt password management best practices without compromising security? Our secure documentation platform is the solution! more