How to Make Your Office 365 Email More Secure

4 easy steps to enhance the security of your company’s email   By Michael Abboud, CEO, TetherView Email remains the primary point of entry for hackers seeking to breach your organization’s network. But most small businesses simply do not have the resources to properly hire a dedicated email security specialist. If your business uses Microsoft Office...

Read More
Locked Computer

Don’t Bring a Sword to a Gun Fight!

As companies continue to splurge on cybersecurity, hackers enjoy record levels of success.  There’s a famous scene in Raiders of the Lost Ark when Indiana Jones is battling his way through a crowded village in hostile territory. As Indy makes his way to safety, the sea of people parts and out from the crowd emerges a master swordsman dressed in all black from head to toe. To capture...

Read More
Data breach

Is Log4J even worse than you think? Probably…

The Log4J Shell is being called the worst security vulnerability in a decade. When you dig into the details…it’s actually even worse than it sounds.    By Michael Abboud, Chief Executive Officer, TetherView   Since its discovery in early December, Log4J has known no shortage of headlines. If cyber...

Read More