What’s New

Top 5 Cybersecurity Threats of 2020

How to stay ahead of bad actors based on the current cybersecurity landscape. It can be challenging to keep on pace with cybersecurity threat trends and even more difficult to stay ahead of bad actors themselves. Cybersecurity threats are constantly evolving as bad actors continue to look for new and improved ways to infiltrate your...

read more

How to Bolster Security in Cloud Computing

Taking advantage of cloud computing benefits while protecting your organization’s valuable data. Many businesses are shifting workloads to the cloud to increase efficiency and streamline workloads. Cloud computing can offer organizations a competitive advantage, but it’s important not to rush into cloud adoptions without understanding...

read more

Is Multifactor Authentication Enough Cybersecurity Protection?

What the T-Mobile breach taught us about multifactor authentication.   In August 2021, T-Mobile confirmed that they had been a victim of a cyberattack that compromised roughly 50 million current, former, and prospective customers. Mike Sievert, CEO of T-Mobile, said the breach primarily exposed some social security numbers, names,...

read more

Phishing 101: What is Phishing and What Can I Do About It?

Get back to cybersecurity and IT basics with a phishing overview.You’ve likely heard the term phishing before, but do you know what it is? There are many definitions available, all of which agree on the basics: bad actors want some kind of confidential information from you, and they’ll disguise themselves as a trusted person or...

read more

Are Your Password Guidelines Protecting Your Organization?

Utilize these new recommendations for password security. Having strong cybersecurity guidelines at your organization might seem like a daunting task. However, you can easily start protecting your company’s valuable data by implementing some simple password guidelines provided by the National Institute of Standards and Technology (NIST). If you...

read more

Pathway Forensics Voted Best in Texas for 11th Straight Year

Pathway Forensics, a subsidiary of Briggs & Veselka Co., was once again voted among the best of the best by Texas Lawyer Magazine, an accomplishment the firm has achieved in each of their relevant categories since the list’s inception more than a decade ago.“We’re so pleased to be recognized for the 11th year in a row. It’s a real testament...

read more

Utilizing Outsourced Services to Manage Risk

How to get the most out of your expert service providers.Addressing your business goals can be daunting, especially if you’ve had to make tough financial decisions or even when you’re poised for growth. In most cases, particularly at small and mid-sized organizations, you likely don’t have the headcount to easily make things...

read more

Cybersecurity Tips and Best Practices for Today

Using yesterday’s cybersecurity lessons to prepare for tomorrow.With so many employees working remotely and all of the operational changes the COVID-19 pandemic caused, every business was – and will continue to be – exposed to a new layer of cyber threat as part of our “new normal”. Now is the time to revisit your cybersecurity...

read more

Data Classification: A Quick Start Guide

How to better protect your data through proper identification.Do you know what data your organization creates, processes, and/or stores, plus where all that different data lives within your organization? If you don’t, you’re not alone.Many organizations create, process, and store all kinds of data every day, but do not have a formal...

read more