Tagged as: Cybersecurity

COVID-19 iOS 13.5 exposure logging feature with Bluetooth icon

What We Know About Exposure Notification Security

Apple Mail iOS Vulnerability

Apple Mail iOS Vulnerability – What You Need to Know

Protect Yourself from Zoombombing

How to Protect Yourself from Zoombombing

New York State SHIELD Act 2020

How Does the SHIELD Act Affect Your Business?

working from home cybersecurity

Working from Home: Cybersecurity Safety During COVID-19

Firefox Browser Vulnerability

Critical Security Vulnerability in Firefox Browser

cybersecurity for small businesses

State of Cybersecurity for Small to Midsized Businesses (SMBs)

dwell time

Unwelcome Guests: What is Dwell Time in IT Security?

Ransomware protection

Ransomware Protection: It’s Still a Thing

Google Chrome Vulnerability Patch

Update Google Chrome Right Now to Patch this Zero-Day Vulnerability

Multi-Factor Authentication Solution

Why You Should Consider 3rd Party Multi-Factor Authentication Solutions

Donuts

Favorite (Cyber) Things: Dunkin’, Marriott and USPS Breaches

sextortion scams

How to Protect Yourself from “Sextortion” Scams

what is mfa

What is MFA, and Why Do We Need It?

training your employees in security

Why Training Your Employees in Security Isn’t Optional