Blog
The Growing Threat of IoT

Just a few years ago the idea of someone hacking into your organization’s network through your HVAC system, or through an employee’s watch would have been ridiculous. But now? Welcome to IoT, or the Internet of Things, a somewhat casual … Read More ›
The Newest Cyberthreat: Cryptojacking

Cryptocurrency, and in particular Bitcoin, has been in and out of the news recently as the volatility in its value elevates investment fortunes one week and then sinks back down to earth the next. With the rise of this unregulated … Read More ›
Owt trap, noitneverp ssol atad fo tra eht dna noitpyrcne (Encryption and the Art of Data Loss Prevention, Part Two)

With cyberthreats on the rise, and hackers becoming more sophisticated, strategies to protect your files are critical—and encryption is a tool too important to ignore. In our last post, we explained the basics and importance of data encryption. Now, we … Read More ›
Cybersecurity Business Risk Discussion
Single Path, in conjunction with Cisco, recently hosted a presentation by renowned cyber security expert Bryce Austin. Bryce shared his experiences while at Target during their breach. The discussion also included valuable information on creating a cohesive tactical plan for … Read More ›
Noitneverp ssol atad fo tra eht dna noitpyrcne. (Encryption and the Art of Data Loss Prevention)

Technology brings your staff closer, enables the sharing of files and information, and even allows off-site employees to work seamlessly together. But that convenience comes with a cost—with connectivity comes risk; with innovation comes vulnerabilities. Networks can be hacked, data … Read More ›
Phishing Part Two: Six More Techniques Hackers are Using to Steal Your Information

In the first part of this two-part post, we detailed some of the most common phishing techniques currently used by hackers, including email phishing, smishing and content spoofing. Here are some additional schemes you should be aware of. Spear Phishing … Read More ›
Phishing Part One: Six Techniques Hackers are Using to Steal Your Information

While you’re reading this blog, hackers are thinking of ways to steal passwords and personal information. Your passwords and personal information. They may use that data for themselves, or sell it on the open market. As we detailed in our … Read More ›
We’re Only Human: The Importance of Security Awareness Training

The term ‘phishing’ became popular in the mid-1990s. It referred to fishing lures, because hackers used email ‘lures’ to hook passwords and other online information. The ‘ph’ was used instead of ‘f’ because some earlier hackers called themselves ‘phreaks.’ These … Read More ›
Are You Ready for GDPR? Enforcement Begins on May 25, 2018.

In April of 2016, after four years of debate and preparation, the EU Parliament approved the GDPR (General Data Protection Regulation). This landmark regulation was designed to protect data privacy, access and provide a way for EU citizens to seek … Read More ›
Don’t Forget to Include These Six Things in Your Disaster Recovery Plan

So, you discover you’re the victim of a security breech or a malicious cyber attack. Your first instinct is to panic. Tear up your servers. Trash the system. Start fresh. Slow down. Count to ten. If you’ve developed a plan … Read More ›