Blog

December 13, 2018
Person on VPN

Technical Security

7 Commonly Neglected Security Tasks: DMARC, DNS Calls, And More

In this age of digital transformation, IT staff are under incredible pressure to keep up with the breakneck speed of new technology adoption, implementation, and management while trying to maintain usability, productivity, and efficiency. With this reality...
 read more
November 29, 2018
Chrome Autofill

Social Engineering

Why Users Should Never Auto-Fill Forms: Browser Exploit Overview

Life is hectic. As a result, we all look for ways to eliminate inconvenience, ease our stress levels, and save precious time. However, some comforts might come at too high of a price. Unfortunately, the auto-fill function on your browser might be a...
 read more
June 15, 2017
Servers

Technical Security

6 Strategies to Prevent SQL Injection Attacks

Despite the fact that they’ve been around since the 90s, SQL injection attacks are still making headlines. Well-documented by security organizations like the Open Web Application Security Project (OWASP), SQL injection attacks should be well-known...
 read more
May 4, 2017
Computer User

Technical Security

5 Ways to Secure Your Access Control Vulnerabilities

Access control is a complex undertaking, which leaves it ripe for vulnerabilities and risks. Consider these five ways to shore-up your access control security approach and ensure your user permissions and settings aren’t putting you at risk...
 read more

join our email list