Tagged as: Security

Garmin Ransomware Attack

The Garmin Ransomware Attack: A User’s Perspective

Contact Tracing

Contact Tracing, Privacy and COVID-19

dwell time

Unwelcome Guests: What is Dwell Time in IT Security?

Ransomware protection

Ransomware Protection: It’s Still a Thing

Google Chrome Vulnerability Patch

Update Google Chrome Right Now to Patch this Zero-Day Vulnerability

3rd party patching

Adobe’s Zero-Day Vulnerability Makes Case for 3rd Party Patching Policies

Multi-Factor Authentication Solution

Why You Should Consider 3rd Party Multi-Factor Authentication Solutions

Good Password Hygiene

Keeping Your Passwords Squeaky-Clean: 5 Tips for Good Password Hygiene

Donuts

Favorite (Cyber) Things: Dunkin’, Marriott and USPS Breaches

Shop - Shopping Bags with gifts

Shop Safely this Holiday Season with These Online Shopping Tips for 2018

Binoculars

How to Protect Yourself from “Sextortion” Scams

boarded up window with bars

What is This MFA Thing, and Why Do We Need It?

Sneaker stepping on banana peel on floor

Why Training Your Employees in Security Isn’t Optional

Datacenter and Cloud Infrastructure

Microsoft Extends Security Updates for Windows Server 2008 and SQL Server 2008 with Azure Migration

7 Top Questions to Consider Before You Migrate Data to the Cloud

7 Top Questions to Consider Before You Migrate Data to the Cloud

Microsoft Azure Services

The 3 Most Important Considerations of Your IT Strategy: How Microsoft Azure Services Can Check the Boxes

fax machine and printer

Faxploit: Yes, Your Fax Machine Really Is a Threat

Life Saver on Boat Dock

When Giving Up the Internet Isn’t an Option: 12 Tips for Safe Browsing

EFAIL Email Encryption Vulnerability

EFAIL: Keep Calm and Don’t Disable Your Email Encryption

United States Currency

Why Are Attackers Targeting O365? It’s Where the “Money” Is.

Meltdown & Spectre: Part Two

Meltdown & Spectre: Part Two

Chain with breaking link

The Weakest Link