• Sections
    • Cloud Computing
      • Amazon Web Services
      • Google Cloud
      • Microsoft Azure
    • Containerization
    • Data Center
    • Mobile Technology
    • MS Exchange Server
    • Networking
    • Office 365
    • Security
      • Hacking & Cyberattacks
      • Malware
      • Compliance & Privacy
      • Ransomware
      • Social Engineering
      • Vulnerabilities
    • Virtualization
    • Windows 10
    • Windows Server
  • Tech News
  • Tutorials
  • Reviews
  • Newsletters
    • WServerNews
    • FitITproNews
  • Podcast
  • Product Directory
  • Webinars
  • About
    • Advertising
    • About Us
    • Contact Us
    • Meet The Team
    • Legal
      • Privacy Policy
      • Terms & Conditions
    • Sections
      • Cloud Computing
        • Amazon Web Services
        • Google Cloud
        • Microsoft Azure
      • Containerization
      • Data Center
      • Mobile Technology
      • MS Exchange Server
      • Networking
      • Office 365
      • Security
        • Hacking & Cyberattacks
        • Malware
        • Compliance & Privacy
        • Ransomware
        • Social Engineering
        • Vulnerabilities
      • Virtualization
      • Windows 10
      • Windows Server
    • Tech News
    • Tutorials
    • Reviews
    • Newsletters
      • WServerNews
      • FitITproNews
    • Podcast
    • Product Directory
    • Webinars
    • About
      • Advertising
      • About Us
      • Contact Us
      • Meet The Team
      • Legal
        • Privacy Policy
        • Terms & Conditions
    Author

    Stephen M.W.

    Stephen regularly writes about technology, business continuity, compliance and project management. He's worked with companies such as Canva.com, EnergyCentral.com, and Citibank.





    Articles / Compliance & Privacy
    These are 10 of the hottest IT security careers today

    While nearly all IT jobs are expected to see rising demand well into the future, it’s IT security careers that show greatest promise.

    Stephen M.W. Posted On January 19, 2021

    Articles / Hacking & Cyberattacks
    Restoring reputation and customer trust after a data breach

    Managing the aftermath of a data breach is ultimately about winning customer trust and restoring reputation. Here’s how to do that.

    Stephen M.W. Posted On January 15, 2021

    Articles / Hacking & Cyberattacks
    5 techniques for determining IT security budget ROI

    IT security investments don’t directly increase revenue. Thus, unconventional methods of IT security budget ROI calculation are necessary.

    Stephen M.W. Posted On January 8, 2021

    Articles / Security
    Outsource IT security? Here are five reasons you should do it

    While there are advantages of running IT security in-house, there’s instances when organizations should outsource IT security for survival.

    Stephen M.W. Posted On December 21, 2020

    Articles / Ransomware
    Ransom payment after ransomware attacks: Yes or no?

    If you are hit by ransomware, you have a choice to make: Make the ransom payment or not. The decision is never easy, and it differs by company and incident.

    Stephen M.W. Posted On November 6, 2020

    Articles / Hacking & Cyberattacks
    7 powerful ways to increase IT security awareness in your organization

    The foundation of effective culture change that bolsters enterprise security and helps avert cyberattacks is a robust IT security awareness program.

    Stephen M.W. Posted On October 30, 2020

    Articles / Hacking & Cyberattacks
    MSSPs: Why managed security service providers are crucial for SMBs

    Managed security service providers were considered the preserve of the world’s largest organizations. That is changing as MSSPs for SMBs become the norm.

    Stephen M.W. Posted On August 21, 2020

    Articles / Security
    Two-factor authentication: It’s great — except when it’s not

    Two-factor authentication (2FA) makes it harder for attackers to circumvent access controls. But it’s important that you are aware of its pros and cons.

    Stephen M.W. Posted On August 14, 2020

    Articles / Hacking & Cyberattacks
    Social media as a tool for malware propagation, cybercrime, and data loss

    Social networking platforms have become a key battleground in the fight against social media malware, cybercrime, and data loss.

    Stephen M.W. Posted On July 24, 2020

    Articles / Security
    Biometrics authentication: Where the technology is now — and where it’s going

    As cyberthreats rise in number and complexity, biometrics authentication technology has seen rapid adoption and growing acceptance by the public.

    Stephen M.W. Posted On July 10, 2020

    2
    Newer Posts Older Posts
    • Join Our Newsletter

      Learn about the latest security threats, system optimization tricks, and the hottest new technologies in the industry.

      Over 1,000,000 fellow IT Pros are already on-board, don't be left out!

    • Latest Podcast


    • TECHGENIX

      techgenix logo

      TechGenix reaches millions of IT Professionals every month, and has set the standard for providing free technical content through its growing family of websites, empowering them with the answers and tools that are needed to set up, configure, maintain and enhance their networks.

    • Recent Posts

      • COVID and the surge in crypto value: The perfect storm for cryptojacking
      • Assigning RBAC to managed identities in the Azure Portal
      • Microsoft 365 calendar: Tips and tricks to color your world

    Copyright © 2021 TechGenix Ltd. | Privacy Policy | Terms & Conditions | Advertise
    Press enter/return to begin your search