12 Password Best Practices

Continuing on with our celebration of World Password Day, we'd like to share some Do's and Don'ts for passwords. Please Read More to see the article.

FZTS contributed to this month’s CPAmerica Newsletter

Cybersecurity as a journey, not a destination.  Read More for the full article.

World Password Day – Thursday, May 5, 2022

To celebrate, we wanted to provide you with some info regarding passwords and security. Read More to see the PDF.

Organizational Resilience Starts with Cyber Resilience

There are some events that are nearly impossible to predict or plan for, such as the recent pandemic, and they create challenges that impact organizations and their management. From employee and customer satisfaction to financial difficulties, supply chain disruption and skyrocketing cyberattacks, as a business owner,...

Why You Should Welcome an Outside Security Review

More than once over the years, we have been retained to perform a security review and encountered reluctance on the part of technology staff or the manager of a particular department. In one case when I started the interview with the CIO for a HIPAA analysis,...

Print Nightmare?

Yet another “Surprise” security hole with no current patch or fix.  A new vulnerability has come to light targeting the Print Spooler services on all Windows based computers. This vulnerability dubbed “Print Nightmare” is already known to hackers, which means if they can get a...

Basic Cybersecurity Controls You Should Already Have in Place

Week after week massive data breaches remind us that pretty much all of our previous passwords are in the hands of cybercriminals.  Ransomware continues to be on the rise with new twists and tools and cybercriminals are constantly looking for new ways to monetize the...

Are Hackers Living in Your Network? (Why Monitoring Security Inside Your Network Matters)

Hackers could be "living" inside of your network right now. This sounds paranoid and delusional, but it is absolutely true of every network on the planet. How did they get in? • Phishing emails: Someone clicked a link or opened an attachment. ...

The Cybersecurity Roadmap

Effective cybersecurity defense is a journey. Do you have a roadmap for your journey? The reason that most compliance requirements focus on some type of documented plan is that it is a fundamental way to lower your risk.