cybersecurity

Cybersecurity 101: Close the door on open network shares

If you have open network shares on your network, you are opening the door to cybersecurity risks. Use PowerShell to…

3 months ago

An inside look at the business of cyberthreat detection and interdiction

What’s it like working as a cyberthreat detection expert whose job is to analyze every threat to our connected world?…

5 months ago

Cybersecurity challenges in 2020: What they are and how to tackle them

The way we depend on our computers and mobile devices has raised the bar on cybersecurity challenges. Think 2019 was…

5 months ago

It’s all in your hands: Devising a winning cybersecurity strategy

Developing a robust cybersecurity strategy is one of your most effective tools for preventing an attack. But how do you…

1 year ago

Oh the humanity! Why people are your biggest cybersecurity risk factor

You can ramp up your security technology all you want, but you still have to watch out for the biggest…

1 year ago

15 cybersecurity terms even your non-techie employees must know

Do you have non-techie employees? If they understand these key cybersecurity terms, they will be able to make the right…

1 year ago

Urgent message to SMBs: Plug these cloud security gaps now

Think you won’t be hit by hackers because you’re an SMB? Think again. And that’s why you must close these…

1 year ago

Breach and attack simulation: Risks and rewards of BAS solutions

Having a cybersecurity expert simulate an attack on your network with a BAS product can reap big benefits — if…

1 year ago

Cities increasingly in the crosshairs of ransomware attacks

Major cities are increasingly the targets of hackers who believe governments are easy prey for ransomware attacks. There are ways,…

2 years ago

Cyber kill chain: How understanding what it is can help you stop cyberattacks

If you don’t know how a cyberattack happens, you may be defenseless to stop it. A cyber kill chain can…

2 years ago