Just in

Industry news, resources and our use cases

The Colonial Pipeline Hacked and ransom paid

Two lessons in network securityRemote workers are more vulnerable than those in the office; Colonial Pipeline was NOT hacked from inside; it was hacked through the computer of the employee working from homePaying the ransom is wrong; keep your backups up to date.The...

read more

BEC Taxonomy: Payroll Redirects

Last Time in the BEC Taxonomy Series… Proofpoint researchers in the second of the Business Email Compromise (BEC) taxonomy series began delving into the Theme tier of the Email Fraud Taxonomy framework (Figure 1), focusing on invoice fraud and demonstrating how the...

read more

The Latest in Phishing

Phishing Statistics and News Credential Phishing Attacks Quadrupled in Q3 2018 Proofpoint’s latest Protecting People: A Quarterly Analysis of Highly Targeted Attacks analyzes email attacks on Fortune Global 500 companies that took place from July to September 2018....

read more

IT Consulting

Our consulting practice is geared toward custom projects and strategic engagements.

Our services

We take care of managing your IT infrastructure while saving you time and money on its maintenance and upgrade.

Managed Service

Our Managed Services Program, is an efficient way for you to have an in-house IT department without the expense.

Cybersecurity consulting

With our internal and external resources, along with our vCIO service, we can provide the scope of engagement that will encompass the identification of current attack vectors, risk mitigation, and overall strategy.