previous arrow
next arrow
Slider

Blog

Cyber-security glossary

 November 18, 2019    0 Comment

By Aly McDevitt

For those unfamiliar with the vernacular involved with cyber-security and the methods by which bad actors attempt to access restricted data, we present this glossary of common terms: Backdoor: A malware type that allows unauthorized users to discreetly bypass normal authentication procedures to gain access to a computer system. By

By James Hadley

Today’s businesses are under constant attack from cybercriminals determined to gain illicit access to their networks, steal information or money and generally wreak havoc. While this is a current–and evolving–threat, the key to ensuring these businesses are protected from such attacks may lie in a 60-year-old practice based in manufacturing.

By Brien Posey

The code injection cyber attack method can be a serious threat to the business. Here’s what you need to know about heading off a code injection attack.Code injection attacks, which are sometimes referred to as remote code execution attacks, can be a serious threat to an organization’s security. Interestingly, however,

By Austin Distel

Staying safe while online dating is two-fold – protect yourself and protect your personal information. Online dating is perhaps the most personal of the many activities we engage in on the internet as we open ourselves up to strangers online in hopes of finding love, or at least a bit

By JAMES GELINAS

Cybercriminals continue to step up their game as they target your data. Some of them resort to simple techniques like phishing to steal your credentials, while others take it a step further with gadgets like credit card skimmers or hacking devices. But recently, some hackers have taken identity theft to

Locations

Get a Quote

If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.