What Small Businesses Need to Know About Cyber Insurance

Cyber insurance is an insurance policy that can help your business pay for damages and recovery costs resulting from cyber events such as data breaches, cyber theft, ransomware and more. Complying with your policy requirements maximizes your chances of receiving a payout to cover the...


Top Cyber-Incident-Prevention Best Practices

Provide cybersecurity training for your employees: Your company is more secure if your employees are constantly trained on cybersecurity best practices. By educating your workforce on various cybersecurity risks, from data theft to ransomware, you can prevent them from committing simple errors. Stay up to date...


12 Password Best Practices

Continuing on with our celebration of World Password Day, we'd like to share some Do's and Don'ts for passwords. Please Read More to see the article.


FZTS contributed to this month’s CPAmerica Newsletter

Cybersecurity as a journey, not a destination.  Read More for the full article.


World Password Day – Thursday, May 5, 2022

To celebrate, we wanted to provide you with some info regarding passwords and security. Read More to see the PDF.


Organizational Resilience Starts with Cyber Resilience

There are some events that are nearly impossible to predict or plan for, such as the recent pandemic, and they create challenges that impact organizations and their management. From employee and customer satisfaction to financial difficulties, supply chain disruption and skyrocketing cyberattacks, as a business owner,...


Why You Should Welcome an Outside Security Review

More than once over the years, we have been retained to perform a security review and encountered reluctance on the part of technology staff or the manager of a particular department. In one case when I started the interview with the CIO for a HIPAA analysis,...


Print Nightmare?

Yet another “Surprise” security hole with no current patch or fix.  A new vulnerability has come to light targeting the Print Spooler services on all Windows based computers. This vulnerability dubbed “Print Nightmare” is already known to hackers, which means if they can get a...


Basic Cybersecurity Controls You Should Already Have in Place

Week after week massive data breaches remind us that pretty much all of our previous passwords are in the hands of cybercriminals.  Ransomware continues to be on the rise with new twists and tools and cybercriminals are constantly looking for new ways to monetize the...


Are Hackers Living in Your Network? (Why Monitoring Security Inside Your Network Matters)

Hackers could be "living" inside of your network right now. This sounds paranoid and delusional, but it is absolutely true of every network on the planet. How did they get in? • Phishing emails: Someone clicked a link or opened an attachment. ...