policy

Cyberthreats and the finance sector

The financial sector has long been heavily targeted by cybercriminals. Over the years, the number of attacks that involved extortion,…

6 years ago

Think your password is secure? Think again

A password policy designed for federal agencies must be secure, right? Surprisingly, that hasn’t been the case, according to the…

6 years ago

The true cost of an ugly website

We are taught never to judge a book by its cover. But in this superficial age, looks are everything, especially…

6 years ago

Why Healthcare needs Mobile Device Management

Surveys and studies show that wireless device usage in the healthcare industry is growing at an exponential rate, falling in…

6 years ago

Ready for tax season phishing scams?

As tax season looms, so do phishing scams. For cybercriminals, this is the ideal time of year to deceive unsuspecting…

6 years ago

IT hardware checklist for SMBs

As a business owner, you don’t want to start the new year faced with last year’s hardware problems. And although…

6 years ago

Tips to Protect Your Smartphone

Cyber criminals will always be eyeing your data regardless of where it’s stored. That means even your trusty Android phone…

6 years ago

Google improves Chrome’s security settings

Most web browsers have built-in security measures to protect users, but some of those aren’t enough to ward off unwanted…

6 years ago

Google ridding MR from search results

Modern-day cyber criminals utilize every resource possible to launch attacks, one of which has been publicly available until now. Google…

6 years ago

How HIPAA wards off ransomware threats

Hospitals and healthcare organizations are usually the first victims of malware attacks. WannaCry ransomware — malicious software that encrypts files…

6 years ago

This website uses cookies.