top of page
Blog


The Principle of Least Privilege - Securing Our House
We are continuing our discussion on "Securing Our House" where we share the steps we are taking internally at Mapletronics to ensure that...


Is Detection the Future of Cybersecurity Planning
Cybersecurity is top of mind for many organizations of all sizes and industries. Given the current risk climate, organizations are...


Securing Our House - Office 365 Security Standards
We are continuing to work on our internal goal here at Mapletronics to "Secure Our House". We have prioritized closely looking at and...


Is a Distributed Workforce Here to Stay?
Covid-19 has caused swift changes in the way organizations get work done. It leads us to question what adaptations will be here to stay....


Securing Our House: How Phishing Testing is Decreasing our Chances of Being a Victim of Cyber Crime
Phishing Testing for 3 Months Has Taken Our Phishing Prone Percentage from 14.3% to 4.5% Due to the ever-growing cybersecurity concerns...


Teams vs. Zoom? Which collaboration tool is right for my Organization?
We have compiled some of the strengths and weaknesses of both platforms to help inform your decision in which choice is the right choice for


Tips for Securely Using Videoconferencing Tools
When videoconferencing it is important to make sure you are set up in a secure manner to be sure that you are not sharing out any confident


Adapting to a Remote Workforce
Due to ever changing regulations throughout the country in response to the pandemic Covid-19, many businesses are having to quickly adapt to


Not using MFA results in 99.9% of hacked Office 365 accounts
In late February 2020, Alex Weinert, Microsoft's Director of Identity Security, delivered a presentation a the RSA 2020 security...


Small Businesses are an Ideal Target for Hackers
Cybercrime has quickly become today's fastest-growing form of criminal activity. In fact, it is projected to cost businesses $5.2...


What is Office 365 Advanced Threat Protection?
Does your workplace use Office 365? Do you have sensitive company data that needs to stay contained within your organization? If so,...


You Should Be Phishing Your Users
As phishing continues to be a top threat to your business' cybersecurity, it is important to employ creative strategies to prepare &...


2 Factor Authentication: What is it and Why Does My Business Need It?
Security breaches are becoming a growing issue for businesses of all sizes. It is a good time to consider how you secure your online...


How Using a SIEM Can Help Protect Your Business
As security threats continue to grow and businesses of all sizes are continually affected, it is more important now than ever before, to...


5 Indicators that an Email Might be a Phishing Attempt
As Phishing continues to be a large concern for businesses both large and small. We have compiled a list of 5 indicators that an email...


Phishing - What is It and Why is it a Potential Threat to Your Business?
What is Phishing? Phishing is an attempt, by criminals who pose as a legitimate source, to lure individuals into providing sensitive...


Phishing by Industry - 2019 Benchmarking Report from our Partners at KnowBe4
ACCORDING TO VERIZON'S 2019 DATA BREACH INVESTIGATION REPORT, PHISHING WAS THE #1 THREAT ACTION USED IN SUCCESSFUL BREACHES LINKED TO...


I Don’t Really Need Cybersecurity Insurance – Do I?
Your data is under attack. You’ve seen this in the news with the Equifax and Target breaches – and the number of data breaches is...


Catch Up on What You Missed at Our Technology Conference
On September 19, 2019 Mapletronics hosted their first Technology Conference at their Goshen, IN office location with live-streaming...


Are Your Employees Prepared for Cybersecurity Hack Attempts That Come Threaten Your Organization?
To help combat the overwhelming concerns of a cybersecurity breach, we have put together a list of a few ways to educate employees
bottom of page