Press enter to search
December 11, 2018

5 Threat Intelligence Data Feeds Relevant to Small Businesses

Threat intelligence (TI) has become a hot topic of conversation in large organizations — particularly among cybersecurity teams seeking to anticipate the next steps of hackers and scammers. This post aims to bridge the gap and clarify doubts, looking more closely at the benefits TI can bring to SMBs.

November 27, 2018

Cybersecurity in Health Care Still Struggling: What You Should Know

The health care industry is still having a hard time getting its cybersecurity under control, despite ongoing knowledge that the sector is among the most vulnerable to attack compared to most others. It's worth examining why the health sector faces these challenges and what can be done to remedy the problems.

November 15, 2018

The Role of Artificial Intelligence in Cybersecurity

Everything we use online today is being managed by artificial intelligence. The newsfeed you browse each day is the result of an AI learning your preferences in order to give you only the most relevant articles. However, one of the toughest challenges AI faces is related to cybersecurity. In this article, Cristopher Burge discusses the role of AI in the unseen world of cybernetic crime.

November 8, 2018

How One Plugin Can Sabotage Site Security

If you’ve ever created a website through a modular Content Management System (CMS) such as WordPress, you’ll know the combination of intimidation and excitement provided by a seemingly unlimited pool of plugins. But just one plugin can be enough to sabotage your site’s security. How? This blog explains.

November 6, 2018

Cybersecurity for Freelancers: What You Need to Know

As a freelancer, your computer is essential to your income. Many businesses that rely on technology as much as you do have dedicated IT departments that screen cybersecurity threats. You are the IT department for your business, which means it’s up to you to protect yourself and your client’s data against an attack.

October 19, 2018

Taking Control of Your Security in the Office

From the way we communicate to the way we collaborate and even to the way we store data, we’re more digitally connected at work than ever before. Whether your company stores data in the cloud, permits the use of social media on its networks or promotes BYOD (Bring Your Own Device) policies, our online personal and business habits are merging.

October 16, 2018

Your Greatest Security Asset: Employees

Having an informed workforce that knows how and is actively involved in keeping the physical and extended virtual workplace as safe as possible can reduce risk due to human error. To that end, SVP and CISO for Cisco, Steve Martino, recommends setting a goal to move employees through three phases of security engagement.

August 22, 2018

5 Ways to Spot a Phishing Email

Phishing emails are one of the most common online threats, so it is important to be aware of the tell-tale signs and know what to do when you encounter them. Here are five ways to spot phishing attacks.