Threat Feed
7 TIPS TO GENERATE STRONGER PASSWORDS
What is one of your online passwords? I bet you its not strong enough. Let us guess, is it your pets name? Is it your family members name? Or is it the year you graduated? [...]
MAY THE 4TH BE WITH YOU!
Are Hackers like the users of THE FORCE? The Jedi Code = White Hat Hackers…“Ethical hackers” with good intentions. These hackers are usually independently hired (Peace) to search for holes, problems or vulnerabilities in [...]
Alert: Postcard Disguised as Official OCR Communication
OCR has been made aware of postcards being sent to health care organizations informing the recipients that they are required to participate in a “Required Security Risk Assessment” and they are directed to send their [...]
RANSOMWARE IN THE NEW AGE; STOP, THINK, CLICK!
RANSOMWARE IN THE NEW AGE; STOP, THINK, CLICK! Ransomware is not a new word at all, but the times in which we are dealing with it are new to all of [...]
SolarWinds Breach and Detection Tool
SolarWinds Breach and Detection Tool We have been monitoring all the events going on in the last few days and staying up to date with the news surrounding the breach of SolarWinds. Thanks to the [...]
BENEFITS OF FOLLOWING A CLEAN DESK POLICY
BENEFITS OF FOLLOWING A CLEAN DESK POLICY A Clean Desk Policy provides many benefits for a business, such as helping to protect sensitive information, minimizing the risk [...]
WHAT IS WEB APP TESTING AND WHO NEEDS TO INVEST IN IT?
WHAT IS WEB APP TESTING AND WHO NEEDS TO INVEST IN IT? Web app testing is critical to any technology company. It allows you to test web apps through scripts, with [...]
HOW TO ACCURATELY GAUGE YOUR CYBERSECURITY RISKS
HOW TO ACCURATELY GAUGE YOUR CYBERSECURITY RISKS You can’t skimp the headlines of articles written for business leaders without coming across all kinds of references to cybersecurity. At this point, it’s [...]
7 STEPS FOR DIY WEB APP TESTING
7 STEPS FOR DIY WEB APP TESTING Web application testing is a vital step for any business that uses the internet for e-commerce, online ticketing, and even some communication options. This [...]
4 WAYS A DATA BREACH COULD COST YOUR COMPANY (AND HOW TO STOP THEM)
4 WAYS A DATA BREACH COULD COST YOUR COMPANY (AND HOW TO STOP THEM) Did you know that there’s a new data security threat waiting around every corner? The Internet can [...]
HOW AI IS CHANGING BUSINESS CYBERSECURITY
How AI is changing business cybersecurity AI has been a disruptor in a variety of industries and practices. In the world of cybersecurity, it’s become a powerful tool as a new [...]
WHAT TO CONSIDER WHEN CHOOSING A CYBERSECURITY PARTNER
WHAT TO CONSIDER WHEN CHOOSING A CYBERSECURITY PARTNER For small and medium-sized businesses, one of the important decisions they often need to make is how to implement a robust IT team. [...]