Today's cyber threats continue to evolve and grow more sophisticated. There are phishing campaigns, malicious websites, ransomware, malvertising, DoS attacks, man in the middle attacks, brute force attacks and more. Yet, too many businesses remain ill-prepared to combat them.
The modern office is designed around sitting, and for office workers, that most likely includes sitting in front of a computer for most of the day. But while you’re sitting there trying to be as productive as possible, it’s important to remember the impact that this type of all-day computer use has on your physical health as well as your...
With tax season upon us, I am reminded of that old saying about the only certainty in life being death and taxes. But there’s one more certainty we can add to that list. Because now tax season inevitably ushers in any number of inventive – and effective – tax scams aimed at defrauding you.
We all know that sometimes – despite our best efforts – data disasters just happen. But there are also potentially some employee behaviors putting your business at risk, and it’s important to identify the things that can be done to reduce the poor behaviors that threaten your network.
SplashData’s annual list of the worst (worst meaning most commonly used, therefore the least secure) passwords has been released and it reveals that computer users are STILL using weak, easy-to-guess combinations to protect their accounts.
Technology moves fast, and trying to keep up with the "next best thing" is enough to make your head spin. But there is a much better alternative to chasing the trends, and that is to focus on specific technology priorities that will help you to best protect your data and also maximize those innovations that most closely align with YOUR specific...
Business Email Compromise (BEC) scams are a growing problem, costing U.S. companies over $1.5 billion in business losses, according to the FBI’s statistics. As one of the most dangerous cyber threats targeting businesses of all sizes, it’s important to understand what it is, how it works and how to detect one.
So your holiday wish came true…you got that cool new smartphone, tablet or other device. As much fun as it is to start doing all the things with it, it’s really important that you also think about how to secure your new device and the personal data that lives on it. Here are some tips for what to do to protect your information.
We know, we know…they’re soooo tempting, and fun! But there are some very real hidden dangers of online tests, quizzes & surveys that you should know about before you click.