Category

education and training
Written by Chris Peterson, Forbes According to a 2019 survey from The Conference Board of more than 800 international CEOs and 600 C-suite members, cybersecurity is cited as the top external concern. The Conference Board also notes (via CIO Dive) that malicious cyber activity cost the economy up to $109 billion in 2016. CEOs and boards that seek...
Read More
https://www.cisomag.com/6-practices-to-strengthen-your-password-hygiene-in-2020/ By Rudra Srinivas The National Cyber Security Centre (NCSC) of the United Kingdom recently issued a warning to its citizens to have stronger and unique passwords after releasing a file that contained the top 100,000 commonly hacked passwords from the “Have I Been Pwned” data set. With unprotected databases and online services getting breached often, leaked/stolen passwords from...
Read More
The importance of establishing strong cybersecurity systems within small to mid-sized companies increases every day. 60% of small businesses who are the victim of a cyber attack close their doors within six months. The U.S. Small Business Administration claims over 1/3rd of all cyber crimes target small to medium sized businesses. Those statistics have continued...
Read More
VPN
What is a VPN? Every time you access a website while browsing the internet your data must first go through your Internet Service Provider (ISP). They can log and track that data while seeing everything you do online. Some of these companies even sell that information to governments, advertisers, or other third parties.  A Virtual...
Read More
🎁 Tips for Safe Online Holiday shopping. 🛍 In 2018, 8% of consumers surveyed said they were victims of Identity theft during the holiday season. As black Friday approaches 56% of holiday shoppers plan to make purchases online in 2019. Before you shop this holiday season, we have prepared a list of cyber tips for...
Read More
Written by: Teju ShyamsundarSenior Product Marketing Manager at Okta The current state of device based access control It’s no secret that devices have changed the way we work. Mobility has transformed the enterprise enough to redefine the term “mobile device.” With modern management techniques for mobile form factors as well as laptops and tablets, the...
Read More
“The cloud? Sure, we’re in the cloud. We ported our on-prem solution to a virtual machine.” Heard that from your network hardware vendor recently? Don’t blame Jane Salesperson. She’s been selling appliances for years. It’s what she knows. It’s what she’s commissioned on. For her, and for the appliance company for which she works, the cloud...
Read More
97% of all email users do not know what a phishing email looks like. 21% of all ransomware is sent through email and 92% of all malware is sent through emails. The average financial cost of a data breach is $3.86m. Email phishing is a very dangerous and also very common way for cyber criminals...
Read More
Mobile phones have a huge impact on the day-to-day lives and the way one communicates with the world. With leading mobile messaging platform WhatsApp recently revealing a major security flaw that could let hackers access phones, it’s time to reconsider safety measures for mobile networks. Even in the corporate world, it’s hard to find an...
Read More
The true beginning to cybersecurity within any organization is awareness. Are you aware of your cyber surroundings? Are you and your employees trained and prepared to face a cyberthreat? You may know of the common cyber threats that cross your paths such as phishing, smishing, malware, and ransomware, but can you and your employees recognize every threat?...
Read More
1 2