"Hacked" in red letters surrounded by binary code- referencing data breach

Equifax: 5 Tips for Victims and What Employers Everywhere Need to Know

The Equifax breach, which is still under investigation, has left the nation reeling. Here at Threat Sketch, our heart goes out...

Business man committing hardware theft: wearing gloves and holding a mask over face while carrying laptop.

The True Cost of Missing Hardware: Protecting Yourself From Theft & Loss

While many small business owners are concerned with data loss through cyber attacks such as malware and hacks, physical hardware theft...

"DDoS" word cloud

Denial of Service- When Your Website is Under Attack

Data shows that more than half of all small businesses have websites, which they use to advertise services, offer information to...

Customer handing credit card

Card Skimming & Small Businesses: Protecting Cash Machines from Hackers

Cash machines, like registers and ATMs, are a vital part of nearly any business, but they are also vulnerable to physical...

Three arrows with a bug symbol hitting the glowing center shield triggering different cyber attack threats 3D illustration

Beyond Phishing and Malware: The Top 5 Other Cyber Attack Patterns

Millions of small businesses are attacked by hackers every year. In fact, 43% of all cyber attacks are directed at small...

Young businesswoman having problems with her computer (perhaps she has allowed an accidental exposure attack), she is staring shocked at the computer screen with a hand over mouth

Preventing Accidental Exposure – Your Guide to Minimizing Human Error to Improve Cybersecurity

As a business owner, you are probably hyper aware of the costs of human error. It can affect your profit margin,...

Data security can be compromised by many avenues, abuse of trust & abuse of privilege are common attack patterns

4 Steps to Protect your Company from Abuse of Trust Attacks

When you download an app, use a website, hire an employee, or install software, you implicitly express your trust in that...

Text CYBER ESPIONAGE on blue digital background

Cyber Espionage – Small Businesses are Prime Targets

Cyber espionage is one of the most pressing cybersecurity risks for small businesses. These attacks are designed to steal data, but...

ransomware eye looks at viewer concept.

Six Ways to Spot a Fake Ransomware Demand

Undoubtedly, one of the most pernicious of the current crop of cybercrimes is ransomware.  Unlike many stealth-based approaches to profiting off system intrusion,...