When cloud technologies first debuted, most companies were baffled by the value of the cloud. Then, it became a tool primarily for large enterprises, requiring a fairly heavy lift and shift for full adoption. But now, the cloud has become the backbone for business continuity, hybrid work and collaboration. Microsoft OneDrive for Business is the […]

Let’s get real here. Many small to midsize businesses feel safe from all the chatter about cyber attacks. But with the average United States data breach costing $9.44 million, it’s becoming increasingly clear that businesses need to take risk management and cybersecurity seriously. Investing the time to complete a cybersecurity assessment checklist can be a […]

There are several steps that an organization should take to minimize their likelihood of being email “spoofed” by a hacker.  Best Practices for SPF and DKIM are highlighted. What does it mean to be spoofed? There are several methods, but the overall goal is to persuade email recipients to believe that an email received from […]

Imagine that your employee’s personal computer has been hacked. They only ever used one password for personal accounts, and one of the online stores they shop at has been breached. Their password was made public on the dark web, and cybercriminals have used it to hack into their laptop. Now, imagine that your employee is […]

Covering Your MacBook Camera Users have become wary of their personal data and devices and there has been a rise in the amount of users who cover their MacBook camera with various coverings. Apple has become aware of this phenomenon and has discovered several negative consequences that can come from using various camera covers on […]

Spear phishing is becoming an increasingly prevalent means of a cyberattack. In fact, Symantec reported that 65% of all malicious groups initiate cyberattacks with spear phishing, in their 2019 Internet Security Threat Report. Unfortunately, this means that many organizations have fallen victim to this type of attack. However, we will explore some actions that can […]

Cybersecurity in New Jersey Comes into Focus in 2019 New Jersey Hospital System Hit By Cyberattack Ransomware Attacks New Jersey’s Livingston Public Schools Shakespeare Theatre in Madison Hit By Ransomware Attack The last two months of 2019 were rough for cybersecurity in New Jersey, with high profile attacks significantly harming major businesses and causing them […]

Signed into law by the governor of New York in July 2019, the SHIELD Act goes into effect on March 21, 2020.  The law covers all employers, individuals or organizations, regardless of size or location, which collect private information on New York State residents.  Failure to implement a compliant information security program is subject to enforcement […]

Given the accepted inevitability that a cyberattack or breach will happen, law firms must: Properly secure their network perimeter. Evaluate their vendors. Craft a solid cybersecurity incident response plan and information dissemination plan. Involve all employees in the firm’s data protection plans. Educate employees on the reporting of potential problem, as well as the protocol […]

We are excited to announce Clutch has placed Exigent Technologies in third place on their Leader’s Matrix out of the top cybersecurity companies in New York. This recognition can be attributed to our influence in the IT industry, our focus on performing at the highest level, and our ability to deliver consistently without fail. For […]