top of page
Search
Nov 1, 20212 min read
Social media quiz or phish?
That social media quiz could be used for more nefarious purposes.
77 views0 comments

Sep 15, 20213 min read
Malicious office documents: The latest trend in cybercriminal exploitation
Cyberattacks have increased over the last year as criminals rake in record ransomware payments.
73 views


Sep 13, 20213 min read
Cyber attacks on the rise
Colby Kalinowski, regional manager at Bedrock Technology headquartered in Jessup, said they’ve seen a significant uptick in cyberattacks sin
101 views

Aug 20, 20212 min read
What NOT to Do With a Suspicious Email
This was originally written by The KnowBe4 Security Team on 8/18/2021. Learning how to identify suspicious emails is essential to keeping...
143 views0 comments


Jul 12, 20213 min read
What is an authenticator app and why should you use one?
Having a strong password is just the first step. You want to add extra layers of protection as hacks and breaches become more prevalent. Aut
729 views


Mar 5, 20213 min read
The 'real consequences' of ransomware against schools
This was originally written and posted on Statescoop by Benjamin Freed on October 20, 2020. The public school system in Yazoo County,...
66 views0 comments


Nov 30, 20203 min read
Online Holiday Shopping Cybersecurity Tips
A CreditCards.com survey shows more than two out of three (71%) holiday shoppers plan to do most of their seasonal shopping online this...
80 views0 comments


May 26, 20201 min read
How small businesses can safeguard their data
A new malware specimen is released every 4.2 seconds. As a small business owner, how can you be expected to keep up with the ever-shifting t
57 views0 comments


May 21, 20207 min read
7 Cybersecurity tips for small businesses with remote workers
SMBs must adapt and implement cybersecurity practices while their workers work remotely.
63 views0 comments

Apr 28, 20201 min read
Breaches happen. Learn how to protect your organization.
learn the three most commonly used inroads into your system and how best to secure your data from each strategy using Microsoft 365
55 views0 comments


Apr 8, 20202 min read
10 Cybersecurity Tips for Working at Home
Now that everyone in your office is working from home, here are 10 tips to help your users and company to stay secure.
67 views0 comments

Jan 23, 20202 min read
Phishing attacks are becoming more personal
Check out this highly personalized and targeted phishing attempt one of our Bedrock employees received recently!
40 views0 comments

Jan 8, 20205 min read
How to Secure Your Wi-Fi Router and Protect Your Home Network
It's essential to keep your router secure. These simple steps will help secure your home network and devices, and significantly reduce
64 views0 comments


Aug 22, 20194 min read
6 Non-Email Phishing Attacks Everyone Should Identify Now
77 percent of phishing attacks are launched via file-less techniques that go undetected by standard endpoint security solutions. In other wo
84 views0 comments


Jul 15, 20198 min read
4 tips for building a strong security culture
Security teams should empower users with a culture of personal responsibility so that they treat data security in the same way they approach
44 views0 comments


Jul 10, 20192 min read
More Than Half of Small and Medium-sized Business Devices Run Outdated Operating Systems
New research underscores security weaknesses in small-to midsized businesses including a dependence on antiquated Microsoft operating system
61 views0 comments


Jun 24, 20194 min read
Healthcare Data is a Hot Commodity for Hackers
The healthcare industry is high on hackers’ hit lists due to the volumes of sensitive personal information ranging from Social Security numb
59 views0 comments


May 14, 20196 min read
The Security of Connected Medical Devices
In few industries is the growth of connected devices so rapid and widespread as it is in the healthcare industry.
62 views0 comments


Mar 20, 20193 min read
Where Should You Invest Your Cybersecurity Budget?
How much your business spends on cybersecurity matters very little. It’s how you spend it that makes a real difference.
46 views0 comments


Mar 6, 20193 min read
Is your IT System at Risk for a Physical Attack?
Here we take a look at some of the most common ways that cyber criminals can utilize physical attacks against your company, as well as some
51 views0 comments
bottom of page