Five Nines Blog

Five Nines Experts Sharing Actionable IT Advice

Timely Patching: Prioritizing Your Risk Management

Do you patch all critical vulnerabilities within 'X' days? If you've dealt with an audit, cyber insurance, or third-party vendor due diligence, you've probably seen some variant...

Why Businesses Need Multi-Factor Authentication

Typing in a simple username and password is no longer enough to protect your data in the business technology world, which is why multi-factor authentication is such an important...

What Are Password Managers And Why Are They Important?

What's your go-to password? We all have one. Is yours secure? You can test how secure one of your top-of-mind passwords really is by checking it here:...

Secure your data with these password tips

In recent years, billions of people have been affected by various data breaches and cyberattacks. Not only have these victims lost money or valuable data, but they also lost their...

What Is Phishing?

We'd like to throw a quick statistic your way. According to Verizon's Data Breach Investigations Report, over 74% of all breaches include a human element in some way. Why is this...

Top 5 Signs of Social Engineering

It's true – your devices, accounts, and data are all incredibly valuable to cyber criminals, no matter your industry or role. According to Verizon’s 2024 Data Breach Report, 68%...

Why Phone Record Breaches Increase Risk of Impersonation Scams

The AT&T phone record breach – which took place in 2022 and was disclosed July 2024 – affects everyone. Even if you're not an AT&T customer, records of calls placed and text...

The Urgency of MFA: Lessons from the Change Healthcare Cyberattack

Information released from the Change Healthcare ransomware attack in February 2024 reveals the absence of Multi-Factor Authentication on a remote-access tool that attackers used...

IT Security Priorities: Top Recommended Improvements to Make This Year

It's a harsh reality for most small and mid-sized businesses, but it's the truth. You simply don’t have the resources to stop well-funded, highly-targeted attacks. But that's not...

Bulk Emailing for Small & Mid-Sized Businesses | What You Need to Know

In a recent development, both Yahoo and Google have chosen to make DMARC a requirement for email delivery. This move is a significant step toward enhancing email security and...