It’s all in your hands: Devising a winning cybersecurity strategy

Developing a robust cybersecurity strategy is one of your most effective tools for preventing an attack. But how do you…

11 hours ago

Thousands of MongoDB databases deleted in cyber-extortion attacks

MongoDB databases are getting deleted by the thousands. We've got a problem here, folks, and the blame goes to a…

15 hours ago

How PowerShell transcription logs can boost your system security

Worried someone may be using PowerShell for nefarious purposes? Here is how to leverage PowerShell transcription logs to see what’s…

2 days ago

WhatsApp spyware attack: Everything you need to know

With its end-to-end encryption, Facebook-owned WhatsApp was considered to be a highly secure app — until this serious vulnerability was…

5 days ago

10 endpoint security issues every SMB faces — and what to do about them

How can small and medium-sized businesses protect themselves against the onslaught of cyberthreats? Begin with endpoint security.

5 days ago

Improve security with PowerShell’s constrained language mode

Constrained language mode is very powerful tool for locking down PowerShell in an effort to prevent it from being used…

5 days ago

Oh the humanity! Why people are your biggest cybersecurity risk factor

You can ramp up your security technology all you want, but you still have to watch out for the biggest…

6 days ago

SMBs guide to combatting and preventing cryptojacking attacks

In 2018, there was a 31 percent rise in cryptojacking attacks. Here’s how your SMB can minimize the threat and…

6 days ago

Still using legacy security tools? Get ready for disaster

Legacy security tools just don’t cut it in the modern cloud-centric IT world. Here are several reasons you need to…

7 days ago

15 cybersecurity terms even your non-techie employees must know

Do you have non-techie employees? If they understand these key cybersecurity terms, they will be able to make the right…

2 weeks ago