Blog

6 Signs to Help Employees Spot a Phishing Email in 2022

It’s estimated that last year employees in around 86 percent of organizations opened an email message that was designed by a cybercriminal to steal sensitive information or otherwise cause harm. Cybersecurity professionals have a fitting name for scams that involve fraudulent email messages that trick their recipients into doing something that’s against their best interest: […]

Read more

Zero Trust Security: What It Is and How to Get Started

To an outside observer, it may seem that the tech industry is constantly inventing new buzzwords (think cloud, big data, artificial intelligence, automation, and so on) to force innovation for the sake of innovation. In reality, IT buzzwords typically describe emerging technologies and practices that address real-world issues experienced by a large number of organizations.

Read more

10 Cybersecurity Dos and Don’ts for Remote Employees

The global health crisis that paralyzed the entire world last year caused a massive shift to remote working as organizations tried their best to remain operational. Although the COVID-19 restrictions that prevented many employees from working from the office have largely been lifted, remote working is here to stay, at least to some extent.

Read more

How to Avoid Email Phishing Attacks in 2021

Movies and TV shows make it seem that all cyber attacks involve a hoodie-wearing computer wiz entering complicated commands at a lightning-fast speed to infiltrate heavily defended networks of high-profile organizations. The reality, as is often the case, is far less glamorous but just as alarming.

Read more

Bridging the Security Skills Gap in the Workforce

Organizations of all sizes feel the pressure to expand their digital footprint to increase their competitive advantage. However, they are struggling to find specific security talent to help them with the adoption of the latest information technology solutions because there is a growing security skills gap in the workforce that creates an irresistible opportunity for […]

Read more

Should I Encrypt My Laptop?

Losing a laptop is never fun, especially if you use it for work and store sensitive data on it. In such a case, the cost of replacing the laptop is the least of your worries because whoever finds the laptop could potentially have access to information whose unauthorized disclosure would cause far greater financial damage.

Read more

Why Your Business Is the PERFECT Target for Hackers

It almost seems that a month doesn’t go by without a massive data breach involving a vast quantity of personal information making the headlines. Indeed, organizations such as Equifax, Ashley Madison, Adobe, eBay, Heartland Payment Systems, or LinkedIn have all experienced the consequences of insufficient cybersecurity, and people all around the world have read about […]

Read more

It’s Time to Rethink Your Password Strategy

A lot has been said and written about the importance of having a strong password strategy. Unfortunately, it seems that many password strategies need to be revised from the ground up because compromised passwords are responsible for 81 percent of hacking-related breaches, according to the Verizon Data Breach Investigations Report.

Read more

Cybercriminals Are Working Overtime as Coronavirus Continues to Spread

During the past several years, cybersecurity researchers have witnessed what can only be described as an explosion of ransomware targeting Windows users. Some of the most devastating ransomware attacks, such as WannaCry and NotPetya, infected hundreds of thousands of computers and brought down massive corporate networks.

Read more

People Are the Weakest Link in Cybersecurity

With digital natives, people who have grown up with technology and are used to being constantly connected, entering the workforce in large numbers, the old mantra that people are cyber security’s weakest link have never been more accurate. In recent years, the vast majority of data breaches have been caused by human error, and 78 […]

Read more