Blog

Stay current with the latest in technology and cybersecurity.

My DEF CON Experience: Seeing Security Through New Eyes

November 1, 2024

How often do we get the chance to go behind enemy lines and see how the other side works? Coopsys Security Technician Vitor Brandao did just that, attending DEF CON 32 this past August in Las Vegas.  DEF CON is perhaps the most well-known hacker conference in existence. Debuting in 1993, the iconic event has…

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Hacker searching the dark web

What is the Dark Web?

July 6, 2022

We use the internet every day for a multitude of reasons — Email, social media, or even fact-checking something you said earlier in a conversation. Facebook, Twitter, and Google are popular websites we often find ourselves gravitating to whenever we’re bored, and with it, we assume we can see everything going on in the world.…

Cybersecurity for Financial Industries

June 29, 2022

Cybersecurity MUST be a top priority for the financial services industries.   Your data is always at risk of being exposed in a widespread company breach.  Banks, credit unions, and other financial institutions must work diligently to be prepared for the cyber threats of tomorrow, even as they become more advanced and complex. This includes meeting…

Buying New Equipment – Plan Ahead!

June 22, 2022

How long has it been since you’ve upgraded your business tech?   If your business is expanding, your need for reliable, up-to-date technology is too. Part of the growing pains you’ll encounter as you build a loyal customer base is the inevitable investment in the technology that makes it possible. Equipment, connectivity, and infrastructure optimized for…

Beware of These 3 Trending Social Engineering Scams

June 17, 2022

What is social engineering  As more businesses transition to remote work and operating from a cloud, threat actors have discovered the biggest weak point in their cybersecurity—the employees.   Social engineering is a tactic used by criminals designed to abuse human emotions such as empathy or fear to convince an unsuspecting victim to do any desired…

NIST Framework Image

What is NIST and Why Should I Care?

June 15, 2022

You’ve heard other Managed Service Providers (MSPS) boasting about being NIST certified or following the NIST framework when applying cybersecurity programs, but you might have one question:  What does that mean to me?  The difference is night and day; it could mean everything.  NIST 101  The National Institute of Standards and Technology (NIST), originating from…

Top 3 Personal Password Managers

May 31, 2022

You need a password manager You can’t remember every password for every service and tool you use—that’d be unrealistic. If you can, that means your passwords are too short, easy to remember, or are all the same. It’s a blatant vulnerability that any thief could capitalize on. You might be tempted instead to use your…

You’re Invited to the 2022 Cybersecurity Summit Series

May 31, 2022

Sponsored by Cooperative Systems Your business is at risk of a cyberattack In today’s threat landscape, more and more businesses are becoming vulnerable to threat actors. As technology rapidly evolves, you’ll need to stay ahead of the curve to protect yourself and your company’s integrity in the eyes of your clients and business partners. At…

What is a DDoS Attack, and What Do I Need to Know Right Now?

April 8, 2022

A DDoS attack is always bad news, and terrifyingly commonplace in our current world. In Q1 of 2022 alone, the Kaspersky DDoS Intelligence system reported approximately 91,052 global DDoS attacks have been launched so far. To make matters worse, Kaspersky also reports 44.34% of all DDoS attacks had their sights set on US-sourced organizations, which…

May 5th is World Password Day — is Yours Secure?

April 6, 2022

Did you know one of the easiest vulnerabilities for a cybercriminal to target when infiltrating your system is your password? 81% of 2021 US data breaches were caused by weak passwords with high credentials according to the Verizon 2021 Data Breach Investigation Report (DBIR). They’re a common human error, but the reason we do it…

Economic Sanctions vs Cybersecurity

April 4, 2022

With growing tensions between the Ukraine and Russia, and the US’s responsive economic sanctions on Russia, you may be surprised to learn how much this can affect the future of cybersecurity. It may not be on the forefront of your mind, but that doesn’t make the impact any less palpable for businesses in the US,…

What are the Top 4 Things You Need to Know to Protect Your Bank from the Next Cyber Invasion?

March 30, 2022

Reading time: 8 minutes  In an era of increased banking options and billions being made by Chase and Bank of America (among others), it shouldn’t surprise anyone that cybercriminals have made financial institutions a lucrative target. But unfortunately, robbing banks is never as easy (or as simple) as walking through the door. That’s just Hollywood…

What are the Top 3 Cybersecurity Events You Can’t Afford to Miss in 2022?

March 28, 2022

Read time: 9 minutes  Whether you are looking for the latest technical expertise or are wanting to build strategic skills to advance your career, various cybersecurity events exist to help you do both. As technology advances and cyber threats increase in sophistication, it’s becoming increasingly essential for IT professionals to stay on top of the…