Blog
Cyber-security glossary
November 18, 2019
0 Comment
By Aly McDevitt
For those unfamiliar with the vernacular involved with cyber-security and the methods by which bad actors attempt to access restricted data, we present this glossary of common terms: Backdoor: A malware type that allows unauthorized users to discreetly bypass normal authentication procedures to gain access to a computer system. By
How Lean Learning Can Improve Cybersecurity Training
November 18, 2019
0 Comment
By James Hadley
Today’s businesses are under constant attack from cybercriminals determined to gain illicit access to their networks, steal information or money and generally wreak havoc. While this is a current–and evolving–threat, the key to ensuring these businesses are protected from such attacks may lie in a 60-year-old practice based in manufacturing.
Cyber Attack Methods: How Code Injection Works
November 18, 2019
0 Comment
By Brien Posey
The code injection cyber attack method can be a serious threat to the business. Here’s what you need to know about heading off a code injection attack.Code injection attacks, which are sometimes referred to as remote code execution attacks, can be a serious threat to an organization’s security. Interestingly, however,
The next big thing in online dating security
November 17, 2019
0 Comment
By Austin Distel
Staying safe while online dating is two-fold – protect yourself and protect your personal information. Online dating is perhaps the most personal of the many activities we engage in on the internet as we open ourselves up to strangers online in hopes of finding love, or at least a bit
5 things you must do to protect your phone from hackers
November 16, 2019
0 Comment
By JAMES GELINAS
Cybercriminals continue to step up their game as they target your data. Some of them resort to simple techniques like phishing to steal your credentials, while others take it a step further with gadgets like credit card skimmers or hacking devices. But recently, some hackers have taken identity theft to