The price of a breach is an executive’s future 

Josh Klasco Blog

Consequences are increasing for companies that don’t take cybersecurity seriously.  You might be thinking, “haven’t there always been repercussions for companies that are lax with their cybersecurity?” There have indeed always been, but they fell mostly on the company, not on the individual people responsible.    That’s the difference with the new stance the Federal Trade Commission (FTC) is taking. From …

4 reasons creative agencies should prepare for cyberattacks

Dror Liwer Blog

  For the 120,000 communications and creative agencies in the U.S., the threat of cybercrime isn’t new. As early as 2009, the FBI publicly warned that hackers were targeting PR agencies.  Yet few agencies have proactively addressed the threats. Over the past decade, many of these same agencies have worked diligently to help their clients establish crisis communications plans, engage …

Heavy equipment dealer lightens their cyber load

Josh Klasco Blog

Several months ago one of our Account Executives, Ren D., reached out to a Tennessee-based company, Heavy Machines LLC.  At the time, Heavy Machines LLC had around 200 employees and was juggling a few different cybersecurity solutions — Microsoft and CrowdStrike. After speaking to their IT Manager, Cozy Sykes, Ren determined that this company would benefit greatly from Coro’s platform.  After a …

3 reasons to offer your clients monthly security reports

Dror Liwer Blog

Why provide monthly security reports?  MSPs today manage much more than just traditional office and storage software for their clients. They’re responsible for managing their clients’ SAAS platforms. And, as most companies moved to a cloud-based working environment, MSPs must ensure their clients’ cybersecurity too. Whether cloud apps, DLP, email, or even endpoints, everything is the MSP’s duty to keep …

The best cybersecurity threat detection happens to be free 

Josh Klasco Blog

Most IT departments are overworked, understaffed, and could use a budget increase of about 300%. When you work in IT, people expect you to be a technological toolbox. You need to understand the myriad of problems that could arise at any moment. It’s your job to diagnose the issue and fix everything. On top of everything else, it is often …

The dangers of using a personal email on a work device

The dangers of employees using personal email on a work device

Josh Klasco Blog

The decision to mix personal and work email: should you do it?  You and your employees spend about a third of your day at work. Frankly, that’s probably a conservative estimate. Most of us don’t sign off the second the clock hits five. Sometimes the lines between our work and personal lives blur. This blur can be the cause of …

Spy with your little eye: hacker activity

Josh Klasco Blog

October is here and so is Cybersecurity Awareness Month. It is a transition period, the weather is unpredictable—short sleeves yesterday and scarves today. Before going out, you check your weather app every morning to see what the weather is like outside. This is detection. In cybersecurity, detection isn’t easy, but it’s important. Hackers often take great pains to hide, even …

Uber CSO punished for lies about data breach 

Josh Klasco Blog

Cybersecurity compromises don’t just hurt the company, they could also have not only civil but criminal ramifications for those responsible for letting them happen — especially if they try to cover them up.  A recent article from Reuters broke the story about Uber’s attempt to hide a data breach.   Turns out Uber suffered a massive cyber attack that no one …

How to tell if your mid-market company is under cyber attack

How to tell if your mid-market company is under cyber attack 

Dror Liwer Blog

Mid-market companies are falling victim to cyberattacks at an alarming rate. As such, we must learn to better identify and respond to threats.      Spotting the warning signs of a cyberattack   Did you know that half of the mid-market company owners victimized by a cyberattack don’t even know about it? There can be some red flags for mid-market company stakeholders …

Tennis and cybersecurity: avoiding unforced errors

Tennis and cybersecurity: avoiding unforced errors 

Jenny Allen Blog

The U.S. Open Tennis Championships just wrapped in Queens, New York, a few subway stops away from Coro’s NYC headquarters.  What does a nearly 150-year-old sport have to do with cybersecurity for mid-market companies? While seemingly polar opposites, the two have much more in common than one might think.   Besides the obvious clichés of “keeping your eye on the ball,” there …