Corrin Jones

Recent Posts

The Risk of a Cyberattack: A Matter of When Not If

Every business is at risk of cyberattack. In fact, it's really a matter of time before your company experiences one. Your organization's response to a cyberattack is going to have a significant impact on whether it's able to recover swiftly—or even recover at all. Here's what you need to know about preparing yourself for the upcoming threats.

Securing Employee Personal Data: Going Beyond a Data Protection Policy

Protecting your company data isn't always enough; sometimes you need to protect employee data as well. Employees are targets for cyberattacks—and if their data is breached the company could suffer a breach as well. Businesses should encourage their employees to keep their data safe, as well as, initiating a data protection policy. If employees are to keep any type of company data on their personal devices they need to be able to follow basic data protection training.

The Social Engineering Techniques To Look Out For

Social engineering is one of the most dangerous and insidious forms of a cyberattack. Always changing and frequently bypassing even sophisticated security solutions, social engineering can seem impossible to defend against. Yet there are ways to avoid the effects of social engineering, primarily by training employees to look for specific social engineering techniques. Better social engineering awareness can reduce your organization's risk overall, though it'll be constant work to update and refresh your training.

Cyber Security Basics - Keeping Employee Software Updated

One of the first cybersecurity basics a company needs to cover is creating a software update policy. Software is periodically updated to protect an organization from newly discovered exploits. When software isn't updated, it becomes vulnerable. Yet while a company can control its own devices, it can't always control employee devices—and these employee devices can become a risk in and of themselves. 

CWPS Completes MSP/Cloud Verify Certification with SOC 2 Type 2 Audit

MSP/Cloud Verify Program offers vendor agnostic certification for Cloud and Managed Services Practitioners Worldwide; Provides Quality Assurance, and Stamp of Reliability for Current, Potential Customers

Chantilly, Virginia [February 4, 2019] – Today CWPS announced that it has successfully completed the MSPAlliance’s MSP/Cloud Verify Program (MSPCV) certification and SOC 2 Type 2. The MSPCV is based on the 10 control objectives of the Unified Certification Standard for Cloud & MSPs (UCS) and is the oldest certification program for cloud computing and managed services providers. CWPS’ SOC 2 Type 2 audit was based on the UCS as well as the Trust Services Criteria for Security and the Additional Criteria for Availability and Confidentiality (TSP section 100A – 2016).

Discover the New Microsoft Teams Features - CWPS







Microsoft Teams has replaced Skype for Business as the new Office 365 Intelligent Communications client. Microsoft Teams is your one stop shop for collaboration, calls and meetings within your modern workplace.

Microsoft has released a complete roadmap in order to help transition your organization from Skype for Business to Microsoft Teams. Teams is fully integrated with Skype for Business features and functionalities to meet all of your chat, meetings and calling requirements.