On the surface, a Bring Your Own Device (BYOD) policy seems like a great business move. By allowing employees to use their own devices, such as laptops, smartphones, and tablets, companies can save money and increase productivity. However, securing your network in a BYOD environment poses unique challenges from both a cybersecurity and a privacy standpoint. If you don’t address … Read More
19 Essential Cybersecurity Best Practices
Every company, no matter how large or small, should have a robust cybersecurity strategy in place to protect their company’s digital assets. Staying secure in the digital era is no longer and set and forget practice. You must be diligent in your security practices and always on top of new trends. To help you ensure your data is secure here … Read More
DNS Spoofing: What It Is & How to Protect Yourself
Cybersecurity crimes have plagued businesses large and small for years, but criminals are increasingly using DNS Spoofing as their tool of choice. In order to protect you and your business from cyber attacks like DNS Spoofing it is important for you to understand what DNS Spoofing is and what measures you can take to protect yourself and your business from … Read More
Basic Website Precautions: Keep Intruders Out With These Fundamental Security Best Practices
When you leave the office for the evening you make sure your doors and windows are locked but if your website isn’t secure your business is still vulnerable. Whether your site is static or dynamic it may be vulnerable to cyber attacks. To help keep your website secure, and your data safe, here are nine things you can do to … Read More
The Major Cybersecurity Threats of 2018… So Far
It seems like every year a plethora of cybersecurity threats are unleashed on the public. Cybercriminals are constantly evolving their tactics in order to steal and compromise important information. Over the past 12 months, we have seen the frequency – and severity – of cyber attacks reach a level of normalcy that large data breaches, such as the recent Equifax … Read More
Recapping DerbyCon 8.0
Written by Tianyi Lu, Chief Architect Compared to larger security conferences, such as Def Con or Black Hat, DerbyCon is more intimate. For me, this means that I’ll have more opportunities to engage speakers and have meaningful conversations. This intimacy is by choice: the conference is quite exclusive, with tickets selling out within minutes of being released. If you’ve never … Read More
Security vs Compliance: What Are Their Differences?
The past year has been one of the most eye opening for many businesses with respect to their cybersecurity needs. Thanks to numerous high-level data breaches and hacks, as well as the May 2018 roll out of GDPR, the importance of security is now front and center. When companies like Equifax, Cloudflare, and Uber endure major (and very public) data … Read More
Don’t Let Phishing Scams Catch You Unaware
Phishing emails are nothing new and have come along way since the notorious “Prince of Nigeria” emails. In this article, we will discuss what phishing is, how to recognize it, and what steps you can take to protect your company and its assets. What is Phishing Phishing attacks attempt to trick the recipient into believing they are somebody who they … Read More
What is a Managed Services Security Provider?
What are Managed Security Service Providers? Managed Security Service Providers are the security guards of the digital world. These companies exist to help you monitor your network traffic and other digital infrastructure for strange behavior, suspicious activity, and unauthorized access. Should anything fishy be detected the managed security service provider will not only alert you to the possible security breach … Read More
Cryptojacking: Because Every Currency Needs to Be Protected
Up until a few years ago one of the biggest security threats on the internet was ransomware. Everyone had a horror story about someone’s computer getting infected and having to pay huge sums of money to regain access to their files. The newest threat on the internet is cryptojacking. Unlike ransomware it is so stealthy you might not even know … Read More