A Look Into CIS Controls

A Look Into CIS Controls

Logical Net is often asked “What are best practices in cybersecurity, as it can affect every aspect of my business and can be very complex”” and “Where do I start and how do I know I’m doing a good job?” Engaging with a cybersecurity provider like Logical Net is a...
The Hidden Costs of a Cyber Attack

The Hidden Costs of a Cyber Attack

We continue our focus on cybersecurity in our February newsletter as cyber criminals constantly invent new attacks. We invite you to schedule a cyber health check with us.   Summary Cyber attacks represent a significant threat to businesses of all sizes, but the...
Penetration Testing: What It Is & Why It’s Needed

Penetration Testing: What It Is & Why It’s Needed

An annual penetration test, also known as a pen test, is a crucial component of a comprehensive cybersecurity strategy for small and medium-sized businesses (SMBs). This proactive approach is designed to identify and address vulnerabilities in your environment before...
Protect Yourself From These MS365 Vulnerabilities

Protect Yourself From These MS365 Vulnerabilities

This month’s newsletter continues our cybersecurity journey with an overview of Microsoft 365 vulnerabilities and recommended security solutions for MS365. MS365 is now the #1 attack vector for cyber criminals because business email compromise is an easy way to prey...