SIRKit

Cyber-Security News/Blog

SIRKit hits incredible 99.7% CSAT score

We challenged our team to maintain an average CSAT score above 95% for an entire year. If you’re unfamiliar, CSAT is a customer satisfaction score. In our case, we ask clients to rate the support experience after each helpdesk ticket. The incoming data feeds the CSAT service, which impacts the overall score. For reference, CSAT …

Read moreSIRKit hits incredible 99.7% CSAT score

Microsoft Authenticator MFA security enhancements are coming February 27, 2023

Effective February 27, 2023, Microsoft is making number matching the default authentication method for their MFA (Multi-Factor Authentication) system. The incoming change improves security by ensuring users don’t accidentally click “Yes” or ignore the importance due to MFA fatigue. Multi-Factor Authentication for Microsoft 365 is a critical security feature that requires a user to approve …

Read moreMicrosoft Authenticator MFA security enhancements are coming February 27, 2023

Microsoft 365 Native External Sender Security Feature – Set-ExternalInOutlook

We’re all annoyed by spam and spoofed e-mails (impersonation attempts). While most of it is harmless and fake, incorrectly opened attachments or links may lead to security incidents like ransomware or network breaches. As aggressive and thorough as Microsoft is with inbound e-mail scanning, it’s reasonable to assume a small percentage of malicious e-mails will …

Read moreMicrosoft 365 Native External Sender Security Feature – Set-ExternalInOutlook

Free Cyber-Security Assessment Tool for Business

Small businesses are three times more likely to be targeted. Understanding if you have enough cyber-security to protect your business can be challenging and stressful. No network or system will ever be 100% secure; however, all companies, regardless of size, introduce a significant amount of protection if they implement the fundamentals. The most important statistics …

Read moreFree Cyber-Security Assessment Tool for Business

Cyber-Security Insurance Applications are getting tougher

As cyber-security incidents continue to climb, insurance providers have again responded by implementing even tighter policy screening protocols. Unfortunately, a considerable number of businesses remain exposed, and cyber-security insurance providers logically need to protect themselves from those who don’t follow cyber-security best practices. This article will help your business prepare for the incoming changes. The …

Read moreCyber-Security Insurance Applications are getting tougher

Risk Assessments and Why Your Business Needs One

If you are a business owner, you’re likely looking for ways to keep your business safe. One of the best ways to mitigate risk is to conduct a risk assessment. While risk assessments can extend to numerous areas, this article refers specifically to IT. A risk assessment is a process that helps identify risk in …

Read moreRisk Assessments and Why Your Business Needs One

What is Smishing?

Received any suspicious texts lately? Smishing is the practice of sending fraudulent text messages claiming to be someone else (usually a company). This is another type of phishing. Smishing scams tend to target mass groups rather than specific individuals like office workers or executives. With smishing messages on the rise, it’s become increasingly important to …

Read moreWhat is Smishing?

What is Least Privilege, and Why is it Important?

The Principle of Least Privilege Least privilege is an essential tool in your cybersecurity toolkit. When appropriately utilized, least privilege can increase security for your organization. But what is least privilege? How can you implement it in your business? Read on to find out. What is Least Privilege? The Principle of Least Privilege (POLP) refers …

Read moreWhat is Least Privilege, and Why is it Important?