Tagged as: Security

Garmin Ransomware Attack

The Garmin Ransomware Attack: A User’s Perspective

Contact Tracing

Contact Tracing, Privacy and COVID-19

dwell time

Unwelcome Guests: What is Dwell Time in IT Security?

Ransomware protection

Ransomware Protection: It’s Still a Thing

Google Chrome Vulnerability Patch

Update Google Chrome Right Now to Patch this Zero-Day Vulnerability

3rd party patching

Adobe’s Zero-Day Vulnerability Makes Case for 3rd Party Patching Policies

Multi-Factor Authentication Solution

Why You Should Consider 3rd Party Multi-Factor Authentication Solutions

Good Password Hygiene

Keep Your Passwords Squeaky-Clean: 5 Tips for Good Password Hygiene

Donuts

Favorite (Cyber) Things: Dunkin’, Marriott and USPS Breaches

sextortion scams

How to Protect Yourself from “Sextortion” Scams

what is mfa

What is MFA, and Why Do We Need It?

training your employees in security

Why Training Your Employees in Security Isn’t Optional

Datacenter and Cloud Infrastructure

Microsoft Extends Security Updates for Windows Server 2008 and SQL Server 2008 with Azure Migration

7 Top Questions to Consider Before You Migrate Data to the Cloud

7 Top Questions to Consider Before You Migrate Data to the Cloud

Microsoft Azure Services

The 3 Most Important Considerations of Your IT Strategy: How Microsoft Azure Services Can Check the Boxes