Blog

August 4, 2021
Ransomware Costs

Data Breach

The Total Cost of Ransomware - 7 Categories

Ransomware costs a lot more than simply paying the ransom. This blog describes 7 categories of cost, some you may not be thinking of.
 read more
June 24, 2021
Software Bug

Data Breach

Zero Day Exploits: Advanced Cyberattacks

Zero-day vulnerabilities refer to new vulnerabilities that are typically discovered by an independent researcher or “bug bounty hunter” which are then validated by the original developer of the software. It essentially means that the...
 read more
June 10, 2021
Office computers

Audit & Compliance

9 Tips for Detecting and Preventing DDoS Attacks

Distributed Denial of Service (DDoS) attacks are one of the most disruptive cyberattacks and can be incredibly difficult to stop. These attacks are often carried out using a network of Internet-connected machines that flood your network...
 read more
May 20, 2021
Artificial Intelligence

Data Breach

AI Poisoning: What You Need To Know To Protect Your Business

Machine learning provides tremendous benefits for automating repetitive tasks. But what happens when the machine learns (or is “poisoned” with) bad code? That’s the reality IT professionals must be wary of when using artificial intelligence (AI) and...
 read more
May 6, 2021
Cybersecurity

Social Engineering

5 Ways to Protect Your Business From Phishing Attacks in 2021

Phishing is one of the most common cybersecurity attacks. In fact, 88% of organizations worldwide experienced phishing attempts in 2019 and, in 2020, phishing accounted for one in every 4,200 emails. Goo...
 read more
April 22, 2021
Internet of Things

Data Breach

5 IoT Trends To Continue Watching In 2021

The Internet of Things (IoT) has taken the world by storm, with a rapid increase of connected devices. In 2020, the world saw...
 read more

join our email list