previous arrow
next arrow
Slider

Blog

By Paul Rubens

Charities offer the potential of rich pickings for hackers and cyber criminals for several reasons. They often store large amounts of valuable data about supporters, they may control significant amounts of money raised from those supporters, and 44% of charities don’t protect themselves with the right cyber security tools since

Cyber-security glossary

 November 18, 2019    0 Comment

By Aly McDevitt

For those unfamiliar with the vernacular involved with cyber-security and the methods by which bad actors attempt to access restricted data, we present this glossary of common terms: Backdoor: A malware type that allows unauthorized users to discreetly bypass normal authentication procedures to gain access to a computer system. By

By James Hadley

Today’s businesses are under constant attack from cybercriminals determined to gain illicit access to their networks, steal information or money and generally wreak havoc. While this is a current–and evolving–threat, the key to ensuring these businesses are protected from such attacks may lie in a 60-year-old practice based in manufacturing.

By Brien Posey

The code injection cyber attack method can be a serious threat to the business. Here’s what you need to know about heading off a code injection attack.Code injection attacks, which are sometimes referred to as remote code execution attacks, can be a serious threat to an organization’s security. Interestingly, however,

By Austin Distel

Staying safe while online dating is two-fold – protect yourself and protect your personal information. Online dating is perhaps the most personal of the many activities we engage in on the internet as we open ourselves up to strangers online in hopes of finding love, or at least a bit

Locations

Get a Quote

If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.