Security

Oh the humanity! Why people are your biggest cybersecurity risk factor

You can ramp up your security technology all you want, but you still have to watch out for the biggest…

1 week ago

SMBs guide to combatting and preventing cryptojacking attacks

In 2018, there was a 31 percent rise in cryptojacking attacks. Here’s how your SMB can minimize the threat and…

1 week ago

Still using legacy security tools? Get ready for disaster

Legacy security tools just don’t cut it in the modern cloud-centric IT world. Here are several reasons you need to…

1 week ago

15 cybersecurity terms even your non-techie employees must know

Do you have non-techie employees? If they understand these key cybersecurity terms, they will be able to make the right…

2 weeks ago

Breach and attack simulation: Risks and rewards of BAS solutions

Having a cybersecurity expert simulate an attack on your network with a BAS product can reap big benefits — if…

3 weeks ago

Business risk: Manage it, ignore it, or outsource it?

Business risk is a part of doing business. But whether that risk turns ugly and becomes a catastrophe depends chiefly…

3 weeks ago

Encouraging secure collaboration in the workplace

Collaboration tools answer the growing need for efficiency in the workplace. But there’s a big difference between collaboration and secure…

3 weeks ago

Amnesty International experiences state-sponsored cyberattack

Amnesty International appears to be the latest human-rights organization hit by a state-sponsored cyberattack launched by an aggressive government.

3 weeks ago

Windows PC utility ‘G-Cleaner’ a front for malware

G-Cleaner is just one example of many third-party applications that prove how easily people are duped into downloading malware.

3 weeks ago

Tap30 ride-hailing app experiences major data leaks

Users of the popular Iranian ride-hailing app Tap30 may be safe, but their drivers are another story after a potentially…

4 weeks ago