How vulnerable is your network to hacked user passwords?

25% of employees are using the same password for all logins. What if that password is available on the dark web? A massive amount of passwords are compromised due to data breaches and used by the bad guys for attacks. Find out if hacked passwords are being used within your organization. Call Southridge to find out more.

Read More

This week’s topic: Avoid Android Malware

Android is the most common operating system among mobile phone users which makes them a top target among cybercriminals. Following these tips can help keep your devices safe. In this week’s security tip video, learn some of the tips and tricks you can follow to protect Android devices. Watch this week’s Security Tip by https://www.pii-protect.com/MicroTrainings/micro_training_view/152?brand_key=hekfo&ID=34770

Read More

Can hackers spoof an email address of your own domain?

Are you aware that one of the first things hackers try is to see if they can spoof the email address of your CEO? If they are able to, they can now launch ‘CEO Fraud’ attacks against your organization, and that type of attack is very hard to defend against. Find out now if you are […]

Read More

This month’s topic: Cybercrime and You

It’s a common misconception that cybercrime only affects big businesses. Not only does cybercrime impact businesses of all sizes, it has huge negative repercussions that can impact us personally as well.   In this month’s security newsletter, learn about some of the personal impacts of cybercrime and what you should be on the lookout for […]

Read More

Windows 7 – Upgrade vs. Replacement

With Windows 7 End of Life, your organization will need to determine whether upgrading devices is sufficient or replacement of devices is necessary. To help you make this choice, here is a checklist to consider when looking to migrate from Windows 7 to Windows 10 successfully. If that fails or if you have any questions […]

Read More

Phishing threats

Phishing is still the #1 threat action used in social engineering attacks and is used to take advantage of our socially networked lives. Attackers use social media to target both your brand and your users by distributing malware or spear-phishing for credentials. Southridge’s new social media phishing test makes it easy for you to identify […]

Read More