Are your users putting a big target on your organization’s back?

The bad guys are constantly coming out with new ways to hack into your network and steal your organization’s confidential information. Our password exposure test allows you to run an in-depth analysis of your organization’s hidden exposure risk associated with your users. Call Southridge to find out more.

Read More

How vulnerable is your network to hacked user passwords?

25% of employees are using the same password for all logins. What if that password is available on the dark web? A massive amount of passwords are compromised due to data breaches and used by the bad guys for attacks. Find out if hacked passwords are being used within your organization. Call Southridge to find out more.

Read More

This week’s topic: Avoid Android Malware

Android is the most common operating system among mobile phone users which makes them a top target among cybercriminals. Following these tips can help keep your devices safe. In this week’s security tip video, learn some of the tips and tricks you can follow to protect Android devices. Watch this week’s Security Tip by https://www.pii-protect.com/MicroTrainings/micro_training_view/152?brand_key=hekfo&ID=34770

Read More

Can hackers spoof an email address of your own domain?

Are you aware that one of the first things hackers try is to see if they can spoof the email address of your CEO? If they are able to, they can now launch ‘CEO Fraud’ attacks against your organization, and that type of attack is very hard to defend against. Find out now if you are […]

Read More

Windows 7 – Upgrade vs. Replacement

With Windows 7 End of Life, your organization will need to determine whether upgrading devices is sufficient or replacement of devices is necessary. To help you make this choice, here is a checklist to consider when looking to migrate from Windows 7 to Windows 10 successfully. If that fails or if you have any questions […]

Read More

Phishing threats

Phishing is still the #1 threat action used in social engineering attacks and is used to take advantage of our socially networked lives. Attackers use social media to target both your brand and your users by distributing malware or spear-phishing for credentials. Southridge’s new social media phishing test makes it easy for you to identify […]

Read More