Blog

10 Cybersecurity Dos and Don’ts for Remote Employees

The global health crisis that paralyzed the entire world last year caused a massive shift to remote working as organizations tried their best to remain operational. Although the COVID-19 restrictions that prevented many employees from working from the office have largely been lifted, remote working is here to stay, at least to some extent.

Read more

How to Avoid Email Phishing Attacks in 2021

Movies and TV shows make it seem that all cyber attacks involve a hoodie-wearing computer wiz entering complicated commands at a lightning-fast speed to infiltrate heavily defended networks of high-profile organizations. The reality, as is often the case, is far less glamorous but just as alarming.

Read more

Bridging the Security Skills Gap in the Workforce

Organizations of all sizes feel the pressure to expand their digital footprint to increase their competitive advantage. However, they are struggling to find specific security talent to help them with the adoption of the latest information technology solutions because there is a growing security skills gap in the workforce that creates an irresistible opportunity for […]

Read more

Should I Encrypt My Laptop?

Losing a laptop is never fun, especially if you use it for work and store sensitive data on it. In such a case, the cost of replacing the laptop is the least of your worries because whoever finds the laptop could potentially have access to information whose unauthorized disclosure would cause far greater financial damage.

Read more

Why Your Business Is the PERFECT Target for Hackers

It almost seems that a month doesn’t go by without a massive data breach involving a vast quantity of personal information making the headlines. Indeed, organizations such as Equifax, Ashley Madison, Adobe, eBay, Heartland Payment Systems, or LinkedIn have all experienced the consequences of insufficient cybersecurity, and people all around the world have read about […]

Read more

It’s Time to Rethink Your Password Strategy

A lot has been said and written about the importance of having a strong password strategy. Unfortunately, it seems that many password strategies need to be revised from the ground up because compromised passwords are responsible for 81 percent of hacking-related breaches, according to the Verizon Data Breach Investigations Report.

Read more

Cybercriminals Are Working Overtime as Coronavirus Continues to Spread

During the past several years, cybersecurity researchers have witnessed what can only be described as an explosion of ransomware targeting Windows users. Some of the most devastating ransomware attacks, such as WannaCry and NotPetya, infected hundreds of thousands of computers and brought down massive corporate networks.

Read more

People Are the Weakest Link in Cybersecurity

With digital natives, people who have grown up with technology and are used to being constantly connected, entering the workforce in large numbers, the old mantra that people are cyber security’s weakest link have never been more accurate. In recent years, the vast majority of data breaches have been caused by human error, and 78 […]

Read more

Watch out for this Android malware

Security researchers have discovered a new Android malware called DEFENSOR ID that snuck its way into the Google Play Store. Forensic analysis shows that the malware takes advantage of an Android device’s Accessibility Services to infiltrate the system and cause damage without being detected. To help you avoid this dangerous strain of malware, we’ve compiled […]

Read more

How to protect your business printers from hackers

Organizations spend resources on keeping their technology and devices secure, but they often overlook one crucial piece of hardware: printers. Printers, just like computers and Wi-Fi networks, can be an entry point for hackers and a gateway to your business’s sensitive information. Here’s what you need to know about keeping your printers secure. What makes […]

Read more