Oh the humanity! Why people are your biggest cybersecurity risk factor

You can ramp up your security technology all you want, but you still have to watch out for the biggest…

1 week ago

SMBs guide to combatting and preventing cryptojacking attacks

In 2018, there was a 31 percent rise in cryptojacking attacks. Here’s how your SMB can minimize the threat and…

1 week ago

Still using legacy security tools? Get ready for disaster

Legacy security tools just don’t cut it in the modern cloud-centric IT world. Here are several reasons you need to…

1 week ago

15 cybersecurity terms even your non-techie employees must know

Do you have non-techie employees? If they understand these key cybersecurity terms, they will be able to make the right…

2 weeks ago

Breach and attack simulation: Risks and rewards of BAS solutions

Having a cybersecurity expert simulate an attack on your network with a BAS product can reap big benefits — if…

3 weeks ago

Business risk: Manage it, ignore it, or outsource it?

Business risk is a part of doing business. But whether that risk turns ugly and becomes a catastrophe depends chiefly…

3 weeks ago

Encouraging secure collaboration in the workplace

Collaboration tools answer the growing need for efficiency in the workplace. But there’s a big difference between collaboration and secure…

3 weeks ago

Amnesty International experiences state-sponsored cyberattack

Amnesty International appears to be the latest human-rights organization hit by a state-sponsored cyberattack launched by an aggressive government.

3 weeks ago

Windows PC utility ‘G-Cleaner’ a front for malware

G-Cleaner is just one example of many third-party applications that prove how easily people are duped into downloading malware.

3 weeks ago

Tap30 ride-hailing app experiences major data leaks

Users of the popular Iranian ride-hailing app Tap30 may be safe, but their drivers are another story after a potentially…

4 weeks ago