Blog

10 Cybersecurity Dos and Don’ts for Remote Employees

The global health crisis that paralyzed the entire world last year caused a massive shift to remote working as organizations tried their best to remain operational. Although the COVID-19 restrictions that prevented many employees from working from the office have largely been lifted, remote working is here to stay, at least to some extent.

Read more

How to Avoid Email Phishing Attacks in 2021

Movies and TV shows make it seem that all cyber attacks involve a hoodie-wearing computer wiz entering complicated commands at a lightning-fast speed to infiltrate heavily defended networks of high-profile organizations. The reality, as is often the case, is far less glamorous but just as alarming.

Read more

Bridging the Security Skills Gap in the Workforce

Organizations of all sizes feel the pressure to expand their digital footprint to increase their competitive advantage. However, they are struggling to find specific security talent to help them with the adoption of the latest information technology solutions because there is a growing security skills gap in the workforce that creates an irresistible opportunity for […]

Read more

Should I Encrypt My Laptop?

Losing a laptop is never fun, especially if you use it for work and store sensitive data on it. In such a case, the cost of replacing the laptop is the least of your worries because whoever finds the laptop could potentially have access to information whose unauthorized disclosure would cause far greater financial damage.

Read more

Why Your Business Is the PERFECT Target for Hackers

It almost seems that a month doesn’t go by without a massive data breach involving a vast quantity of personal information making the headlines. Indeed, organizations such as Equifax, Ashley Madison, Adobe, eBay, Heartland Payment Systems, or LinkedIn have all experienced the consequences of insufficient cybersecurity, and people all around the world have read about […]

Read more

It’s Time to Rethink Your Password Strategy

A lot has been said and written about the importance of having a strong password strategy. Unfortunately, it seems that many password strategies need to be revised from the ground up because compromised passwords are responsible for 81 percent of hacking-related breaches, according to the Verizon Data Breach Investigations Report.

Read more

Cybercriminals Are Working Overtime as Coronavirus Continues to Spread

During the past several years, cybersecurity researchers have witnessed what can only be described as an explosion of ransomware targeting Windows users. Some of the most devastating ransomware attacks, such as WannaCry and NotPetya, infected hundreds of thousands of computers and brought down massive corporate networks.

Read more

People Are the Weakest Link in Cybersecurity

With digital natives, people who have grown up with technology and are used to being constantly connected, entering the workforce in large numbers, the old mantra that people are cyber security’s weakest link have never been more accurate. In recent years, the vast majority of data breaches have been caused by human error, and 78 […]

Read more

New spear phishing attack identified

When looking into the ways companies are hacked, you quickly realize that there are so many different tactics out there that it is mind-boggling. One of the more effective methods used recently is spear phishing, and in early December 2014, a new spear phishing attack was uncovered.

Read more