United States Could Appoint Cyber Security Leaders for Each State

I

n January 2020, a bipartisan group of United States senators introduced legislation that would require the Department of Homeland Security to select cyber security leaders for each state. This...

Read More

7 of the Worst Data Breaches and Cyberattacks of 2019

With the year coming to an end, it’s time to reflect upon the worst data breaches and cyberattacks of 2019. From theft of medical data to corporate account credentials, here they are (in no...

Read More

4 Dangerous Router Attacks to Watch Out For

In the age of ransomware attacks and other data breaches, securing your network is more important than ever—and that includes Wi-Fi. Watch out for these common router attacks that can put a...

Read More

What is Endpoint Security, and Why Is It Important?

With more and more employees using devices to connect to the company network remotely, endpoint security has become increasingly important. Read along to understand what it is, and why it’s vital...

Read More

7 Key Reasons to Use a Password Manager

It’s a good practice to use a complex, unique password for every account you have. The problem is, it’s nearly impossible to remember so many different login credentials. The solution is using a...

Read More

How Not to Fall Victim to Voice Phishing Attacks

Voice phishing attacks are similar to phishing attacks—they trick you into giving sensitive information to criminals. However, most phishing attacks are carried out using the internet. Voice...

Read More

What is an Incident Response Plan, and What Does it Consist Of?

No organization is truly safe from cyberattacks. Even the most comprehensive cyber security strategies with state-of-the-art software falter from time to time. An incident response plan is...

Read More

Why Health Care Cyber Security Threats are Among the Most Dangerous

The health care industry has evolved for the better thanks to the latest technology that streamlines everything from clerical tasks to patient care. However, along with new technology comes new...

Read More

Why You Need to Stop Ignoring Software Update Popups

As tempting as it might be to simply close out of those annoying software update popups that seem to appear every few minutes, there are a few reasons you shouldn’t. Whether these popups are...

Read More

5 of the Most Common, yet Dangerous, Types of Spoof Emails

Most people understand that cyberattacks are often conducted via email. However, few actually know how to successfully recognize common types of spoof emails. In this blog, we’ll break down a...

Read More
1 2 3 4 5 ... 6