It’s Cybersecurity Awareness Month. Do You Know Where Your Passwords Are?

The combination of username and password alone, the standard for online security for decades, has shown that it is woefully inadequate to combat cyberattacks. Passwords are easily compromised Passwords alone are insufficient for protecting sensitive data primarily due to users’ lack of security hygiene and aggressive attacks by cybercriminals. The common problem in these situations… Continue reading It’s Cybersecurity Awareness Month. Do You Know Where Your Passwords Are?

Cybersecurity Jargon: Common Managed IT and Cybersecurity Terms Explained

There has been a lot of talk recently about cybersecurity and managed IT. Unfortunately, not everyone has the same definition of what these terms mean. In this blog, we will step back and try to clear up some of the confusion around some common IT (short for “Information Technology”) terms and how they might apply… Continue reading Cybersecurity Jargon: Common Managed IT and Cybersecurity Terms Explained

When Did You Decide to Get Into the IT Business? Would You Like to Get Out?

If someone asked you what business your company is in, you would probably respond with something like Manufacturing, Distribution, Consulting Services, or another line of business. But how often would you respond with, “My company is in the Information Technology (IT) business”? Believe it or not, you’re in IT if you have at least one… Continue reading When Did You Decide to Get Into the IT Business? Would You Like to Get Out?

On-Premises to SaaS: Identity Management Is Critical for ERP Security

Are you moving from Microsoft Dynamics 365 Business Central (or any other ERP) from on-premises to SaaS? If so, we must discuss Identity Access Management (IAM). What is IAM? In a nutshell, IAM is the process of identifying the users who request access to your systems, granting them access, and controlling their level of access.… Continue reading On-Premises to SaaS: Identity Management Is Critical for ERP Security

Cybersecurity and Remote Workers: Revisiting Your Company’s Security

More and more, a remote workforce has become the norm in today’s business environment. This move to work from home (WFH) has increased employee satisfaction and, depending on which report you read, increased employee productivity. The trend to work from home was largely spurred on by the COVID pandemic when employers needed to quickly allow… Continue reading Cybersecurity and Remote Workers: Revisiting Your Company’s Security

Protecting the Supply Chain from Nation-State Attacks

Cybersecurity aims to remain at least one step ahead of cybercriminals at all times. Cyberattacks are often considered to be the actions of bad actors motivated by monetary gain. However, nation-state attackers threaten to disrupt business, educational, and government operations and are often not motivated by money. What are nation-state attackers? Nation-state attackers are individuals… Continue reading Protecting the Supply Chain from Nation-State Attacks

SMBs Lag Behind in Security Compliance

In recent years, ransomware attacks have surged, coinciding with a notable trend of compliance challenges among organizations. A survey conducted by the Ponemon Institute found that 51% of small businesses in the United States experienced a cyberattack in the past year, and only 28% reported having a security strategy in place. These numbers suggest that… Continue reading SMBs Lag Behind in Security Compliance

ArcherPoint’s Most Popular Content in 2023

Every year, the experts at ArcherPoint work hard to provide informative content that covers a wide range of topics of interest to Microsoft Dynamics 365 Business Central users, from How-To blogs that show you how to accomplish specific tasks in Business Central to technical articles that explain how things work under the hood in Business… Continue reading ArcherPoint’s Most Popular Content in 2023

Take a Look at Yourself: Addressing Internal Threats and Occupational Fraud

Keeping your company’s data safe from prying eyes is vital. You must have a clear understanding of where data is located, who can access the data, the regulations that apply to the data’s security, and how the data can be recovered in the event of an attack. When discussing cybersecurity threats, however, it is important… Continue reading Take a Look at Yourself: Addressing Internal Threats and Occupational Fraud

Password Security and Protection Has Never Been More Important

How secure is your password? For years, the rule has been to use a complex password – the more complex the password, the more challenging it was for a hacker to access your account. Of course, that’s assuming they know your user ID, which, for many accounts, is your email. Password complexity is a function… Continue reading Password Security and Protection Has Never Been More Important