6 Best Practices For Email Security (Or, How Not to Be the Source of a Ransomware Attack at Your Company)

Your email accounts are where you are most vulnerable to being a victim of a cybercrime. Yet email security is often forgotten, even though a surprising number of attacks use phishing attacks to infiltrate a company. Because our inboxes are connected to nearly all the critical systems used in busine...

Why Every Company Needs a Disaster Recovery Policy

If a company relies on computers, it is highly likely that an IT failure would have a negative impact on the business – and make you wish you had a disaster recovery policy. It is important for businesses to understand that no matter how small they are, a disaster is inevitable at some point. ...

But First, Security Policies and Procedures

I’ve seen first-hand what happens when companies fail to fully implement information security policies and procedures. It’s hard to do it properly on your own. That’s why as the Customer Success Manager at Securicy, a central part of my job is recommending the steps for updating and im...