ArcherPoint’s Most Popular Content in 2023

Every year, the experts at ArcherPoint work hard to provide informative content that covers a wide range of topics of interest to Microsoft Dynamics 365 Business Central users, from How-To blogs that show you how to accomplish specific tasks in Business Central to technical articles that explain how things work under the hood in Business… Continue reading ArcherPoint’s Most Popular Content in 2023

Take a Look at Yourself: Addressing Internal Threats and Occupational Fraud

Keeping your company’s data safe from prying eyes is vital. You must have a clear understanding of where data is located, who can access the data, the regulations that apply to the data’s security, and how the data can be recovered in the event of an attack. When discussing cybersecurity threats, however, it is important… Continue reading Take a Look at Yourself: Addressing Internal Threats and Occupational Fraud

Password Security and Protection Has Never Been More Important

How secure is your password? For years, the rule has been to use a complex password – the more complex the password, the more challenging it was for a hacker to access your account. Of course, that’s assuming they know your user ID, which, for many accounts, is your email. Password complexity is a function… Continue reading Password Security and Protection Has Never Been More Important

Remaining Vigilant: External threat detection with OSINT

For all the benefits that the internet has provided to businesses, from cloud computing giving you anytime, anywhere access to your information to robust data analysis at the click of a button, there are also increased risks of cyberattacks that take advantage of security vulnerabilities in the networks, devices, and applications used by these organizations.… Continue reading Remaining Vigilant: External threat detection with OSINT

Phishing, Quishing, Vishing, and Smishing

Just when you thought it was safe to go back in the water… Most people are familiar with the term “phishing,” which describes emails sent by malicious hackers to coax the email recipient (the victim) into clicking on a link that asks them to divulge personal information or login credentials. Sometimes, the victim’s computer is… Continue reading Phishing, Quishing, Vishing, and Smishing

How to Respond to a Ransomware Attack – A Framework for Companies

Ransomware attacks can have devastating consequences for an organization. Some companies could not retrieve all their lost data, even after paying the ransom (let’s face it, attackers do not set up a support team to help you get your data back once they have your money!). Others have been met with subsequent ransom demands from… Continue reading How to Respond to a Ransomware Attack – A Framework for Companies

Protecting Your Cloud Applications from Unauthorized Access

Most businesses are running at least one of their critical applications in the cloud, such as their ERP, CRM, or Payroll. This takes advantage of many of the efficiencies of cloud apps: lower maintenance costs, automatic updates, and anytime/anywhere access. While the large application hosting providers offer robust security features, it is still important for… Continue reading Protecting Your Cloud Applications from Unauthorized Access

Understanding the Potential Risks of Google’s New Domains

In May 2023, Google introduced two new top-level domains (TLDs), .zip and .mov. While the introduction of new domains and unique branding opportunities can be exciting, it’s essential to understand the potential dangers that may arise from the use of Google’s new domains. New opportunities, new threats One of the primary concerns with Google’s new… Continue reading Understanding the Potential Risks of Google’s New Domains

Microsoft Adds Cybersecurity Protocols with New Granular Delegated Admin Policy

ERP partners are always trying to identify continuous improvements for clients, such as adding more functionality, optimizing workflows, and offering new cybersecurity tools or processes. In the area of cybersecurity, so much is changing. New cybersecurity protocols like the Zero Trust Framework are emerging, and Microsoft is acting on these approaches to make its environments… Continue reading Microsoft Adds Cybersecurity Protocols with New Granular Delegated Admin Policy

A Look Back: The Worst Passwords of 2022

We’re looking back at the worst passwords of 2022 and exploring some interesting statistics about password trends. It’s worth noting that the data for this analysis was compiled using independent researchers specializing in cybersecurity, representing 3TB of data across 30 countries. Employees are the best defense against cybercrime, and not having secure passwords can be… Continue reading A Look Back: The Worst Passwords of 2022