It feels like every week there is a new major zero-day vulnerability exploited in one of our most used software…
Tech Tips
There has been a lot of discussion in the media lately about biometric identification – specifically, its use by governments…
Did you know that some of the world’s most successful individuals use calendars to increase their productivity and success? It’s…
A cyber resilience plan is an essential piece of your organization’s overall risk management program. It documents the steps you…
It’s no secret that desktop email clients are gradually losing steam in favor of web and mobile apps. The trend…
24 Mar: The Most Vulnerable Industries to Business Email Compromise: How to Defend Your Organization
The threat of business email compromise (BEC) is real and ever-growing. Every day, businesses of all sizes and in all…
Business owners should be concerned about the activity that occurs in the “dark alley” of the internet. This is a…
When it comes to virtual desktops, there are two main types of hardware that you need to consider: the client…
On January 23, 2019, CNA Financial Corporation made one of the largest ransom payments in history. In order to regain…
You might not have heard of the term “blue-snarfing” before, but it’s a serious security threat to mobile devices that…