top of page
Search
Social media quiz or phish?
That social media quiz could be used for more nefarious purposes.
Nov 1, 20212 min read
77 views
0 comments


Malicious office documents: The latest trend in cybercriminal exploitation
Cyberattacks have increased over the last year as criminals rake in record ransomware payments.
Sep 15, 20213 min read
73 views


Cyber attacks on the rise
Colby Kalinowski, regional manager at Bedrock Technology headquartered in Jessup, said they’ve seen a significant uptick in cyberattacks sin
Sep 13, 20213 min read
103 views


What NOT to Do With a Suspicious Email
This was originally written by The KnowBe4 Security Team on 8/18/2021. Learning how to identify suspicious emails is essential to keeping...
Aug 20, 20212 min read
143 views
0 comments


What is an authenticator app and why should you use one?
Having a strong password is just the first step. You want to add extra layers of protection as hacks and breaches become more prevalent. Aut
Jul 12, 20213 min read
781 views


The 'real consequences' of ransomware against schools
This was originally written and posted on Statescoop by Benjamin Freed on October 20, 2020. The public school system in Yazoo County,...
Mar 5, 20213 min read
66 views
0 comments


Online Holiday Shopping Cybersecurity Tips
A CreditCards.com survey shows more than two out of three (71%) holiday shoppers plan to do most of their seasonal shopping online this...
Nov 30, 20203 min read
80 views
0 comments


How small businesses can safeguard their data
A new malware specimen is released every 4.2 seconds. As a small business owner, how can you be expected to keep up with the ever-shifting t
May 26, 20201 min read
58 views
0 comments


7 Cybersecurity tips for small businesses with remote workers
SMBs must adapt and implement cybersecurity practices while their workers work remotely.
May 21, 20207 min read
63 views
0 comments


Breaches happen. Learn how to protect your organization.
learn the three most commonly used inroads into your system and how best to secure your data from each strategy using Microsoft 365
Apr 28, 20201 min read
55 views
0 comments


10 Cybersecurity Tips for Working at Home
Now that everyone in your office is working from home, here are 10 tips to help your users and company to stay secure.
Apr 8, 20202 min read
67 views
0 comments


Phishing attacks are becoming more personal
Check out this highly personalized and targeted phishing attempt one of our Bedrock employees received recently!
Jan 23, 20202 min read
40 views
0 comments


How to Secure Your Wi-Fi Router and Protect Your Home Network
It's essential to keep your router secure. These simple steps will help secure your home network and devices, and significantly reduce
Jan 8, 20205 min read
65 views
0 comments


6 Non-Email Phishing Attacks Everyone Should Identify Now
77 percent of phishing attacks are launched via file-less techniques that go undetected by standard endpoint security solutions. In other wo
Aug 22, 20194 min read
85 views
0 comments


4 tips for building a strong security culture
Security teams should empower users with a culture of personal responsibility so that they treat data security in the same way they approach
Jul 15, 20198 min read
44 views
0 comments


More Than Half of Small and Medium-sized Business Devices Run Outdated Operating Systems
New research underscores security weaknesses in small-to midsized businesses including a dependence on antiquated Microsoft operating system
Jul 10, 20192 min read
61 views
0 comments


Healthcare Data is a Hot Commodity for Hackers
The healthcare industry is high on hackers’ hit lists due to the volumes of sensitive personal information ranging from Social Security numb
Jun 24, 20194 min read
59 views
0 comments


The Security of Connected Medical Devices
In few industries is the growth of connected devices so rapid and widespread as it is in the healthcare industry.
May 14, 20196 min read
62 views
0 comments


Where Should You Invest Your Cybersecurity Budget?
How much your business spends on cybersecurity matters very little. It’s how you spend it that makes a real difference.
Mar 20, 20193 min read
46 views
0 comments


Is your IT System at Risk for a Physical Attack?
Here we take a look at some of the most common ways that cyber criminals can utilize physical attacks against your company, as well as some
Mar 6, 20193 min read
57 views
0 comments
bottom of page