May 2, 2023
ACUMEN IT - RANSOMWARE

Businesses are getting much better at dealing with ransomware attacks

But the number of successful ransomware attacks is still high
May 1, 2023

Google Authenticator finally, mercifully adds account syncing for two-factor codes

Google Authenticator is adding cloud syncing to enable users to sync their two-factor authentication codes to their Google account, reducing the complexity of dealing with lost or stolen devices.
April 26, 2023

Security professionals must recognize each endpoint’s responsibility for security.

Endpoint resiliency is an essential component of cybersecurity strategies, as compromised credentials can be used to establish a beachhead on an end-user endpoint, leading to the exfiltration of corporate data.
April 21, 2023

How would you know if your business details had been involved in a third party data breach?

Data breaches are security incidents that can affect individuals, businesses, non-profits, and Fortune 500 companies.
April 6, 2023

Companies are worried about the dark web…but aren’t doing much about it

Should you be monitoring the dark web? There are many reasons to stay clear, as it’s a place where criminals do business. But that’s exactly why researchers watch it so closely
March 24, 2023
ACUMEN-IT-CYBERSECURITY

Why Do Small Businesses Need Cybersecurity?

Cybercriminals are well aware that smaller companies may lack the funding for security personnel and software compared to a much larger company.
March 16, 2023
Acumen IT DataSecurity

Five easy steps to keep your smartphone safe from hackers

Your smartphone is where you keep your bank information, private chats, passwords, and more. Here's how to make that crucial information slightly safer.
January 5, 2023
ACUMEN IT RANSOMWARE VILLAGE

This new ransomware is seeing rapid growth, so beware.

Say hello to Trigona, a little-known piece of malware that's making waves in Europe.
January 3, 2023
ACUMEN IT BUSINESS EMAIL

Business email compromise can devastate a business

Researchers at Trustwave's SpiderLabs say that attackers pose as company executives in business email compromise (BEC) attacks.
SUBMIT A TICKET