What you need to know
Not So Boring Blog
Protecting your company from the Dark Web
Boring's Not So Boring Blog CORPORATE DOMAIN MONITORINGStolen user credentials (emails/passwords) found on the Dark Web can indicate that your company or a 3rd party application/website that your employees use may have been compromised and that you should take...
5 common social engineering scams
Boring's Not So Boring Blog Social engineering scams have been going on for years and yet, we continue to fall for them every single day. This is due to the overwhelming lack of cybersecurity training available to the employees of organizations big and small. In an...
Humans & cybersecurity practices
Boring's Not So Boring Blog Based on a comprehensive survey of 5,000 IT managers across 26 countries, Cybersecurity: The Human Challenge provides brand new insights into the state of cybersecurity skills and resources across the globe. It reveals the realities facing...
COVID-19 & Healthcare Cybersecurity
Boring's Not So Boring Blog COVID-19 has phenomenally altered the way healthcare functions, with growing adoption of telehealth and remote patient monitoring. The threat landscape in healthcare, too, has become fertile ground for phishing campaigns, malware,...
Keep your data safe from phishing attacks!
Boring's Not So Boring Blog Cybercrime is on the rise, and hackers are using any opportunity to take advantage of an unknowing victim to gain access to personal information for financial gain. One commonly used tactic is phishing. Phishing messages are crafted to...
Remote Working & Coronavirus
Boring's Not So Boring Blog Coronavirus has brought remote working to the top of everyone’s mind. With many organizations already enabling or exploring remote working, here are 11 tips to help your users, and your company, stay secure while protecting everyone’s...
A smooth transition into going paperless
Boring's Not So Boring Blog There are advantages to going department by department when you implement a document management system. Think of starting small as your “sandbox,” a development term for experimentation that confirms the direction you should be taking....
Facts about Cloud Security and How You Can Protect Against Data Loss
Boring's Not So Boring Blog As cybercriminals continue to take advantage of the public cloud in their attacks, Sophos commissioned an independent survey of 3,521 IT managers across 26 countries* to reveal the reality of cloud security in 2020. The 2020 cloud security...
Contact Us