Remember in 2012 when Dropbox’s data, which contained details of around two-thirds of its customers, were leaked? At the time,…
Every time we learn about a cyberattack that has affected so many businesses, we invest in security technologies that will…
In computers, as in war, encryption is a way of encoding sensitive information so only authorized parties can make use…
Don’t be put off by the tech jargon of security experts you find in forums and self-help books. A managed…
WordPress is one of the most popular and reliable content management systems on the market, and for this reason it…
The NBA Finals may now be over but for one team, the losses keep coming. Yahoo! Sports reported that the…
Although some may have hoped that the threat of ransomware was on the decline, the reality is that it’s quite…
ImageMagick, one of the internet’s most widely used image processing services, is susceptible to attacks that may put your site…
Know thy enemy. When it comes to hackers, most business owners get hung up on the technical and mechanical details…
Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with your company…
This website uses cookies.