Category: Blog

A Security Risk for Small Businesses

Ignorant Employees Sometime, your employees’ mistake or negligence can wreak havoc on your business data, network and programs. For example, some employees leave their unattended PC open or visit malicious sites and sources. Or they may keep the devices containing sensitive data here and there. So, they should be educated on cyber security.  Check out… [Read More]

Dark Web

From: Laurie Clark ‘The dark web’ brings to mind furtive young cybercriminals soliciting drugs, arms or worse from the internet equivalents of filthy souks – crammed with shady stalls stacked high with illicit produce. And let’s be honest, this perception isn’t a million miles away from the truth. Given the ease and much better functionality… [Read More]

The most common social engineering attacks

Insights from: Tamlin Magee The human is the weakest link in the chain of security – you can have all the best technology in place to offset the risk of a malicious attack, but any organisation that doesn’t train its staff or have best practices in place is at even bigger risk. In fact, the most effective… [Read More]

As Malware, Ransomware Surge in 2018, SonicWall Raises Alarm on Encrypted Threats and Chip-Based Attacks

  SonicWall, the trusted security partner protecting more than 1 million networks worldwide, announces record numbers for malware volume, ransomware attacks, encrypted threats and chip-based attacks in the mid-year update of the 2018 SonicWall Cyber Threat Report. Look at this article below:  


The businesses and individuals that provide goods and services to an organization are considered its vendors. A company could work with a few, dozens, or even hundreds of different vendors, all with different contract terms, pay rates, and points of contact that must be managed through a vendor manager. The term vendor management is used when describing the… [Read More]

Next-Gen Security

From: Brett Cheloff What are we trying to secure? Today, data dominates our personal lives, finances, and—with the adoption of big data—our businesses. Maintaining data integrity as it takes over so many major decisions is a top priority. We don’t want to make poor choices because we got the facts wrong. Ultimately, data security is… [Read More]

Clearing the Hurdles: Why Companies Have Not Implemented Basic Best Practices for Mobile Security

By: Kacy Zurkus When it comes to mobile services, it’s been well-established that users value speed and convenience. But organizations that give it to the whims of consumers may face a mountain of security risk. According to Verizon’s “Mobile Security Index 2018,” companies that knowingly choose expediency over security are more than twice as likely… [Read More]

Advice from a Real Hacker:

  One of the first things you need to understand is that hackers are constantly scanning the world for vulnerable systems. They simply write a little program or script to scan every IP address on the planet looking for a particular known vulnerability or two. When they find that your system has that vulnerability, then they… [Read More]