Blog & News
contact us
News Information
Latest News
A Million PhaaS Attacks in Two Months
Phishing-as-a-Service (PhaaS) has emerged as a significant threat. According to a recent article on SmarterMSP, over a million PhaaS attacks were recorded in just two months, highlighting the growing sophistication and prevalence of these attacks. PhaaS provides...
Mastering Post-Incident Reviews: A Guide to Effective Incident Response
Security incidents are inevitable. Whether it's a phishing attack, a system outage, or a misconfiguration, what truly matters is how you respond to and learn from these events. Conducting a post-incident review (PIR) is crucial for strengthening your security posture...
Employee Spotlight: Max Bautista!
Max is April's employee spotlight! Max has been with CTN for over a year working as a systems engineer. Before working at CTN, what was the most unusual or interesting job you’ve ever had? I haven't had many serious jobs outside of IT- so I'd have to say CTN is the...
Phishing-as-a-Service: A Growing Threat
A new and alarming trend has emerged: Phishing-as-a-Service (PhaaS). This innovative yet dangerous model is transforming the way cybercriminals conduct phishing attacks, making it easier and more accessible for even novice attackers to launch sophisticated campaigns....
Navigating Personal Use on Work vs. Personal Computers: Do’s and Don’ts
In today’s interconnected world, it’s common to blur the lines between work and personal life, especially when it comes to computer use. However, it’s crucial to understand the do’s and don’ts of using your work computer for personal tasks and vice versa. Here’s a...
Employee Spotlight: William Hudspeth Blackburn!
William is January's employee spotlight! William has been with CTN for 1 year working as a Technical Account Manager. Before working at CTN, what was the most unusual or interesting job you’ve ever had? When I was 15-16, I managed a team of volunteers for a Dementia...
Your Best Computer Habits for the New Year
As we embark on a new year, it's the perfect time to adopt new habits and improve our routines. Why not extend your list of New Year's resolutions to include better computer habits? Here are some essential hygiene, transport, and security practices to keep your...
Cybersecurity and Compliance Predictions for 2025
As the digital landscape continues to evolve, businesses face new challenges in cybersecurity and compliance. Here are some key predictions for 2025 to help organizations stay ahead: Increased Regulation: Governments worldwide will likely implement stricter compliance...
Testimonial from Empirical Consulting Solutions (part 5)
Testimonial from Empirical Consulting Solutions (part 4)
CONTACT US
Contact Us







