Five Nines Blog

Five Nines Experts Sharing Actionable IT Advice

Why Businesses Need Multi-Factor Authentication

Typing in a simple username and password is no longer enough to protect your data in the business technology world, which is why multi-factor authentication is such an important...

What Are Password Managers And Why Are They Important?

What's your go-to password? We all have one. Is yours secure? You can test how secure one of your top-of-mind passwords really is by checking it here:...

Secure your data with these password tips

In recent years, billions of people have been affected by various data breaches and cyberattacks. Not only have these victims lost money or valuable data, but they also lost their...

What Is Phishing?

We'd like to throw a quick statistic your way. According to Verizon's Data Breach Investigations Report, over 74% of all breaches include a human element in some way. Why is this...

Top 5 Signs of Social Engineering

It's true – your devices, accounts, and data are all incredibly valuable to cyber criminals, no matter your industry or role. According to Verizon’s 2024 Data Breach Report, 68%...

Why Phone Record Breaches Increase Risk of Impersonation Scams

The AT&T phone record breach – which took place in 2022 and was disclosed July 2024 – affects everyone. Even if you're not an AT&T customer, records of calls placed and text...

Microsoft 365 Copilot: Minimize Risk & Empower Innovation

Microsoft 365 Copilot is an AI-powered assistant that is built into the Microsoft 365 suite of applications including Word, Excel, PowerPoint, Outlook, and Teams to provide...

Microsoft Licensing Shake-Up: Why Teams is No Longer Included

In April, Microsoft announced that they have unbundled Teams from the Office suite for all net new Enterprise subscriptions effective September 30, 2024. Customers with existing...

The Urgency of MFA: Lessons from the Change Healthcare Cyberattack

Information released from the Change Healthcare ransomware attack in February 2024 reveals the absence of Multi-Factor Authentication on a remote-access tool that attackers used...

IT Security Priorities: Top Recommended Improvements to Make This Year

It's a harsh reality for most small and mid-sized businesses, but it's the truth. You simply don’t have the resources to stop well-funded, highly-targeted attacks. But that's not...