<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

Tabush Group's Cloud & Managed IT Blog

Get Your Head in the Cloud

Cloud is increasingly becoming popular as more companies have noticed the benefits it offers, such as reliability and security. Cloud provides companies flexibility and, when implemented correctly, cloud can increase the efficiency of your business. However, while there are many benefits of the cloud, it also comes with a few risks.

Topics: IT Cybersecurity IT Best Practices Cyber Attacks Phishing Ransomware

What You Need To Know About Cyber Insurance

Cyberattacks are not a new phenomenon.  They have become an increasingly large problem for all organizations, and now, businesses are turning to cyber insurance as a means of protection against the aftermath of a cyberattack.

Topics: IT Cybersecurity IT Best Practices Cyber Attacks Phishing Ransomware

Steps MSPs Take to Protect Your Data Against Ransomware Attacks

Managed Service Providers (MSP) deliver customers with IT security services and are now finding themselves at the center of attention as cybercriminals are increasingly focusing their attacks on this vital industry.  Though this is a security challenge for MSPs, it also presents an opportunity for them to prioritize internal security protocols to better protect themselves and their clients.  

Topics: Cybersecurity Phishing Ransomware

Phishing Attacks Increase During COVID-19 Crisis

As we mentioned a few weeks ago, cybercriminals are looking to exploit public fears using malware attacks.  Now, spear phishing attacks are increasing at an exponential rate with cybercriminals attempting to capitalize on people working from home and distracted by COVID-19 fears. 

Topics: Phishing coronavirus

Whatever Happens, Cybercriminals Don't Stop

As the spread of coronavirus (COVID-19) continues to grow, the consuming amount of news coverage surrounding the virus has created a new danger – cybercriminals looking to exploit public fears using malware attacks.  It is very important to be cautious for scams in times of uncertainty.  We highly recommend the following tips on what you can do to make you, your colleagues & your families safer online.

Topics: Phishing remote access coronavirus

5 Ways to Prevent a Phishing Attack

The vast majority of data breaches today are phishing attacks, occurring when a cybercriminal casts a broad net in the hopes of catching a small percentage of unsuspecting victims.  In our last blog post, It’s Only Getting Worse, we describe both phishing and spear phishing tactics and why it is imperative for businesses to take precautions to protect themselves. 

Topics: Cybersecurity IT Best Practices Phishing

It's Only Getting Worse

Recently, a company called me to discuss concerns about their IT security.  This company, based in the US but doing business with clients and vendors in many parts of the world, has been inundated with phishing emails.  The difference here is that these phishing emails are not just generic ones that pretend to be Microsoft Office 365 or UPS trying to steal passwords, but rather, they are spear phishing.  Spear phishing involves impersonating actual people associated with the company, like executives or vendors, in attempts to steal money or proprietary information.  These schemes are becoming more and more common.

Topics: IT Services Cybersecurity Phishing

Beware of this Security Vulnerability

Most cloud providers have a huge vulnerability and it's up to businesses to close this big security gap. Sound scary? It is.  But it does not have to be.

Topics: Cybersecurity Phishing