ACCESS THE LATEST AUTOMOTIVE INDUSTRY NEWS RIGHT HERE!
Using Approvals in Microsoft Teams to Boost Dealer Productivity
Dealing with the process of requesting and providing approvals is a common part of every business. Whether you are seeking approval for something or others are seeking your approval [...]
Protecting Against Insider Threats
Often, when a dealership employee resigns or is terminated, the process of off-boarding the employee is left to someone in human resources and/or the employee’s manager. Unfortunately, in many [...]
The Democratization of Cybercrime
In the old days, to be a cybercriminal you had to have some technical skill. This requirement limited the number of people that could get in on this lucrative [...]
Vishing – Another Thing to Worry About
The FBI recently issued a warning about the growing use of vishing as a new tactic that cybercriminals are using to exploit network access and privilege escalation. The rise [...]
Using Indicators of Behavior to Protect Your Dealership
When it comes to protecting your dealership from the cybercriminal - Indicators of Compromise (IOC) is the typical approach utilized. IOCs are evidence that a cyber-attack has taken place. [...]
Dealership Mindset & Cybersecurity
To best defend against the cybercriminal dealers should take it for granted that they will be hacked - believing otherwise is foolish. Properly protecting your business from a cyberattack [...]
Your Dealership’s Phone System & Emergency Services
Have you heard of Enhanced 911 (E911)? Today, all telephony communications in the United States must comply with E911. Basically, E911 is a system that automatically provides the location [...]
A SOC Provides Dealerships With Continuous Threat Monitoring That Mitigates The Risk Of A Cyberattack
Before we get into what a SOC (pronounced sock) is and why every dealer should have one, it’s important to first consider the following which was reported in IBM’s [...]
Helion’s Security Sentinel Levels the Playing Field Against the Cybercriminal
The ability to take advantage of the most advanced, modern cybersecurity defenses has for a long time been a luxury that only large organizations with ample financial resources, cybersecurity expertise, [...]