Ransomware isn’t going away. If anything, it’s getting more prevalent and harder to handle. Know what to do when the worst happens, before it happens. Your private data will thank you!
You may have seen it referred to as two-factor authentication, TFA or MFA.
Why do security experts insist on using multi-factor authentication so strictly and for every account?
PHI is one of the most valuable types of data on the dark web. It can be used for a variety of illegal purposes — which makes it incredibly lucrative data to have.
October is a dedicated time to remind yourself, and others in your workplace, about the importance of cybersecurity whilst promoting good cybersecurity practices at work and home. Cybersecurity Awareness Month reminds everyone that they have a role to play in protecting themselves and their data from cyber threats!
Children are particularly vulnerable to data privacy violations. Thankfully, your local and/or federal government probably have some laws to protect your kids!
Samsung has allegedly been misusing their customers’ biometric data. They just got strapped with a $4M arbitration fee to over 35K customers in a class action lawsuit.
There are two ways you might get new applications delivered to your system: On-premise and software as a service.
What are the benefits? What are the downsides? Find out inside.
Unlike a simple typo when you’re messaging your friends, typosquatting is much more sinister.
Hacking isn’t always a malicious attempt to prey on your systems and data. Sometimes it can be used for good!
Would you trust a hacker to break into your system?
An Iranian hacker group is going after Microsoft Exchange Servers and their vulnerability, ProxyLogon, to exploit target systems. The hackers are calling themselves Ballistic Bobcat.