Cubed background in different sizes and blue colors aligning to a row of glowing information security icons surrounding the word cybersecurity 3D illustration

October is National Cybersecurity Month, an annual initiative for fostering cybersecurity awareness among consumers, businesses, and communities. In that spirit, here are several tips for keeping your data and devices safe: Tip 1: Be Proactive A proactive cybersecurity approach is one of the most effective ways to prevent data breaches. Since vulnerabilities are often overlooked…

Read More

Today’s news is full of reports about cybersecurity breaches. Large, corporate data breaches get the big headlines, but this doesn’t mean small businesses aren’t at risk. Hackers don’t discriminate based on the size of an organization. Who’s responsible for managing your company’s cybersecurity? In this blog, we offer tips for managing evolving threats. Knowing the…

Read More

Every industry is susceptible to data breaches, but healthcare providers are especially vulnerable. Healthcare data breaches have risen over the last decade. In response, the Department of Health and Human Services’ Office for Civil Rights (OCR) has stepped up HIPAA-compliance enforcement, handing out unprecedented fines to covered entities for not following HIPAA breach notification guidelines.…

Read More
Hand writing the text: Scam Alert

Phishing scams targeting businesses have been around for years, but a new round of phishing attacks targeting corporate payroll systems is troubling for small business owners. If an employee falls for a payroll phishing scam, it could compromise your payroll portal. In this blog, we discuss what to look out for and how to boost…

Read More

Did you know when you search the web, you’re only scratching the surface? Below that is an encrypted network where both legitimate and illegal activities take place. It’s the biggest portion of the internet you don’t know about. In this blog, we discuss what you need to understand about the deep web and dark web.…

Read More

Hackers exploit weak access controls, technical vulnerabilities, and negligence to gain access to sensitive corporate data. That’s why having a proactive security approach for your business is critical. But what happens if data is stolen and compromised despite all your efforts? In this blog, we discuss what steps to take after a data breach. 1.…

Read More

If you are going to send an external email that includes a link to a website, here are the steps to follow to ensure you are sending a secure link to your recipients: Please be sure that you check and know—without a doubt—that the website and the URL you’re sending is legitimate and safe. Provide…

Read More

Reclamere’s Founder and President, Joseph Harford, discusses how various STEM education paths can support a career in cyber security. The cyber security field is expected to have a 0% unemployment rate in the next 20 years, and Reclamere is just one of thousands of organizations where cyber security professionals will be in great demand. Reclamere…

Read More