Blog Banner

Securing Success: Mile2 Partner of the Year Winner in Cybersecurity

In the fast-paced world of cybersecurity, recognition for exceptional performance and dedication is a testament to the relentless pursuit of excellence. Today, we gather to celebrate the remarkable achievement of being honored as the Mile2 Partner of the Year. This prestigious award not only acknowledges our commitment to providing top-notch cybersecurity training and solutions but also serves as a testament to the hard work and collective efforts of our entire team.

5 Security Holes in Uploading Company Information to Chat GPT and How to Mitigate Them

In today's digital age, companies are increasingly relying on technology to communicate and collaborate with employees. One such tool is chat GPT, a language model that can understand and respond to natural language inputs. While chat GPT can be a useful tool for organizations, it also poses a potential security risk if employees upload sensitive company information to the platform.

Why Microsoft Certifications Are Important for Your Career in the Tech Industry

Microsoft certifications are important for a variety of reasons. First and foremost, they demonstrate to employers and clients that an individual has the skills and knowledge necessary to effectively use Microsoft products and technologies. This can be especially valuable in the tech industry, where expertise with specific software and platforms is often a requirement for job positions.

CertNexus Americas ATP of the Year

Our partner, CertNexus, has awarded New Horizons the 2021 Americas ATP Partner of the Year.  

8 Tips for better ransomware defenses and responses[INFOGRAPHIC]

Did you know that ransomware attacks are more than a “smash-and-grab” attempt? These attacks are now getting more sophisticated.
Here are eight ways to help defend your data against these growing cyberattacks.

  1. IDENTIFY ATTACKERS’ ONGOING CAPABILITIES
  2. EXPECT DATA EXFILTRATION
  3. LEARN FROM OTHERS’ MISTAKES
  4. ASSUME ATTACKERS STILL HAVE ACCESS
  5. MOVE QUICKLY
  6. MONITOR FOR ODD EVENTS
  7. PREPARE A SECURE COMMUNICATIONS CHANNEL
  8. DON’T RESTORE, REBUILD
RSS

Contact author

x

Subscribe for Future Blog Notifications