May 2, 2023
ACUMEN IT - RANSOMWARE

Businesses are getting much better at dealing with ransomware attacks

But the number of successful ransomware attacks is still high
May 1, 2023
ACUMEN IT - LINKEDIN

LinkedIn can now get users verified for free

Networking site and recruitment platform LinkedIn has announced a new way of verifying users' identities and employment roles that won’t cost them a penny.
May 1, 2023

Google Authenticator finally, mercifully adds account syncing for two-factor codes

Google Authenticator is adding cloud syncing to enable users to sync their two-factor authentication codes to their Google account, reducing the complexity of dealing with lost or stolen devices.
May 1, 2023

How real-time data management is revolutionizing healthcare

Healthcare data streams are increasing exponentially, making clinical data processing increasingly complex.
April 26, 2023

Security professionals must recognize each endpoint’s responsibility for security.

Endpoint resiliency is an essential component of cybersecurity strategies, as compromised credentials can be used to establish a beachhead on an end-user endpoint, leading to the exfiltration of corporate data.
April 21, 2023

How would you know if your business details had been involved in a third party data breach?

Data breaches are security incidents that can affect individuals, businesses, non-profits, and Fortune 500 companies.
April 6, 2023

Companies are worried about the dark web…but aren’t doing much about it

Should you be monitoring the dark web? There are many reasons to stay clear, as it’s a place where criminals do business. But that’s exactly why researchers watch it so closely
March 24, 2023
ACUMEN-IT-CYBERSECURITY

Why Do Small Businesses Need Cybersecurity?

Cybercriminals are well aware that smaller companies may lack the funding for security personnel and software compared to a much larger company.
March 16, 2023
Acumen IT DataSecurity

Five easy steps to keep your smartphone safe from hackers

Your smartphone is where you keep your bank information, private chats, passwords, and more. Here's how to make that crucial information slightly safer.
SUBMIT A TICKET