A new weapon in the never-ending battle against ransomware

Business haven't managed to completely safeguard themselves against the growing tide of ransomware attacks. But this new online tool might…

4 weeks ago

Microsoft 365 security: Tips to keep your tenant safe

Yes, Microsoft 365 has a lot of security built in. But that doesn’t mean you can relax on security. Keep…

1 month ago

Government software provider Tyler Technologies hit by ransomware attack

Tyler Technologies, a major provider of emergency management and election-sharing data used by governments, is dealing with a major ransomware…

2 months ago

Ask Our Readers: Brave browser, cryptic crypto wallets, Daaps — Help!

Everyone has their share of problems in this life. But IT professionals like us tend to have more of them.…

2 months ago

How coronavirus has changed the tech landscape — for the better

Amid the devastation wreaked by coronavirus, the tech landscape is seeing growth in some sectors and bracing for a lot…

7 months ago

Cybersecurity 101: Close the door on open network shares

If you have open network shares on your network, you are opening the door to cybersecurity risks. Use PowerShell to…

9 months ago

An inside look at the business of cyberthreat detection and interdiction

What’s it like working as a cyberthreat detection expert whose job is to analyze every threat to our connected world?…

11 months ago

Raccoon Stealer malware newest business email compromise attack

A simple yet versatile malware called Raccoon Stealer that bypasses anti-spam filters looks like it is going to be a…

12 months ago

Step-by-step guide: Protecting your cloud email infrastructure

Just because your email has gone to the cloud doesn’t mean that it’s hands-off now. Here’s a step-by-step guide to…

1 year ago

10 endpoint security issues every SMB faces — and what to do about them

How can small and medium-sized businesses protect themselves against the onslaught of cyberthreats? Begin with endpoint security.

2 years ago