Network Security

Cyberthreats and the finance sector

The financial sector has long been heavily targeted by cybercriminals. Over the years, the number of attacks that involved extortion,…

7 years ago

Fileless malware: Are you at risk?

Over the past few years, the security industry has been witnessing a rapid evolution in attack techniques, including fileless malware,…

7 years ago

Are autocomplete passwords safe?

Advertisements and suggestions based on our internet browsing habits are sources of online tracking. However, autocomplete passwords are also another…

7 years ago

VPNs: Why you need them

Installing antivirus software and setting strong passwords are no longer considered the bare minimum in cybersecurity. With hackers, third parties,…

7 years ago

Think your password is secure? Think again

A password policy designed for federal agencies must be secure, right? Surprisingly, that hasn’t been the case, according to the…

7 years ago

Not all hackers are cybercriminals

Newspaper headlines and Hollywood movies have shaped our understanding of computer hackers, but in the real world it’s not so…

7 years ago

The lowdown on cloud security

If you’re thinking of transitioning your business to the cloud, consider the security of the platform. While providers would like…

7 years ago

Is your IT security proactive?

Do you spend hours obsessing about the inner workings of DNS-layer security, intrusion prevention systems, and data encryption? If you’re…

7 years ago

Secure your Mac computer in 6 easy ways

If you’re a Mac user, data privacy and security should be your #1 priority. Without the right security measures, you’re…

7 years ago

4 types of hackers that may target SMBs

When it comes to cyberattacks, most business owners get hung up on the technical and logistical details, forgetting another important…

7 years ago

This website uses cookies.