Why Multi-Factor Authentication Is Essential

How can you better protect your organization’s sensitive information and your users’ personal data? Deciding where to focus your information security efforts for the most protection and the best return on investment can be a challenge. Multi-factor authentication is an excellent place to start, and here’s why. More than 60% of phishing messages (in which […]

Live From the Hall: Dave Mims Talks Cybersecurity at GMA’s Annual Convention

At the most recent Georgia Municipal Association (GMA) Annual Convention that took place June 24-28, 2022, Dave Mims, VC3’s VP of Marketing, was interviewed as part of GMA’s popular Live From the Hall show that runs during the convention. During this 5-minute interview, Dave talks about: Why antivirus is no longer enough to protect municipalities […]

The Importance of Employee Security Awareness Training

When it comes to securing your company’s network, you must think beyond technology. Relying on firewalls, antivirus software, and secure remote connections is simply not enough anymore. Why? Cybercriminals can simply trick employees and bypass all your expensive cybersecurity tools and solutions. The actions of your employees are actually the greatest risk to your network. […]

CVEs and What They Mean for SMBs

Each year, thousands of new cybersecurity vulnerabilities emerge. If not properly and immediately addressed, your business will be open to cyberattacks. In 2021, almost 22,000 vulnerabilities were published (Comparitech – 25+ Cybersecurity Vulnerability Statistics & Facts of 2021). To help keep track of cybersecurity vulnerabilities, the National Cybersecurity FFRDC (NCF) (funded by the Department of […]

Recent Report Warns of 56 Vulnerabilities in Operational Technology Devices

A recent report from Forescout shows that 56 vulnerabilities exist in commonly used operational technology (OT) devices. According to the Cybersecurity and Infrastructure Security Agency (CISA), these vulnerabilities are “caused by insecure-by-design practices in operational technology across multiple vendors. The vulnerabilities are divided into four main categories: insecure engineering protocols, weak cryptography or broken authentication […]

A Municipal Guide to Complying with the Law Through Information Security Policies

Technology alone won’t protect towns and cities. Clear, detailed policies document important rules, procedures, and guidelines to help you comply with federal, state, and local laws. So, what kinds of policies do you need? This guide gives you tips and best practices to help you create the following policies: Contract / Vendor Management Network Security […]

Ransomware: A Prevention Guide for Cities

It’s likely that your city, town, or organization has a good chance of experiencing a devastating ransomware attack that leads to permanent data loss. This guide will provide you with: A definition of ransomware and why criminals see you as a target. Seven best practices that will help you anticipate, prevent, and recover quickly from […]

Latest Trend: Hackers Bribing Employees to Install Ransomware

The call is coming from inside the house. Your employees probably aren’t actually hacking your systems, but they could still be the vector for a new cybersecurity threat. Cybersecurity insider threats occur when bad actors approach organizational insiders (such as employees) to install ransomware for them. In return, employees are offered a fixed payment or […]

Cybersecurity Alert: Microsoft Follina Vulnerability

On May 27, a cybersecurity vulnerability was disclosed by Microsoft. The vulnerability is within the Microsoft Support Diagnostic Tool (MSDT), a standard tool that operates within Windows. Cyberattackers can exploit this vulnerability using applications such as Microsoft Word. Because this vulnerability was previously unknown, no patch currently exists. If a cyberattacker were to exploit this […]

5 Reasons Why Municipalities Need a Professional Email Domain

Recently, we took a random sampling of about 10,000 municipal contacts and noted: 735 contacts had consumer-grade Gmail addresses 372 contacts had a yahoo.com email address 216 contacts had a bellsouth.net email address 165 contacts had a hotmail.com email address 93 contacts had a windstream.net email address 92 contacts had an aol.com email address If […]