CyberSecurity

It’s Password Day! Our Tech Leaders List Best Practices for Secure Accounts

Not yet Cinco de Mayo, today we celebrate an equally festive day (in techie minds) - World Password Day!! Celebrated the first Thursday of May, Password Day was created to raise awareness about the importance of password security, the most prominent threats, and best practices for users to follow. [...]

By |2023-05-04T11:50:50-05:00May 4th, 2023|Categories: CyberSecurity, News|Tags: , , , , , |

Phishing Email Refresher – Know What to Look For!

Phishing emails continue to grow in volume and sophistication.  Hackers are doing due diligence and making emails more personalized, thus easier to fall for.  In addition, the availability of AI tools allows for generation of beautifully written, well-structured emails on just about any subject.  Foreign hackers can even write [...]

By |2023-04-27T12:26:45-05:00April 27th, 2023|Categories: CyberSecurity, News|Tags: , , , , , |

New Tool Prevents Company Secrets from Being Fed to ChatGPT

The surge in using artificial intelligence tools like ChatGPT has already resulted in workers leaking sensitive company data to bots, but a new technology aims to protect company data. In fact, it's already happening. Samsung recently experienced a series of leaks after employees purportedly pasted source code into the new bot, [...]

By |2023-04-26T11:59:03-05:00April 26th, 2023|Categories: CyberSecurity, News|Tags: , , , , , , |

Free Cybersecurity Tool You Need To Be Using

Cybersecurity Professionals use this Tool Every Day. Have You Tried It? Have I Been Pwned Created by award-winning cybersecurity thought leader and teacher Troy Hunt, Have I Been Pwned is a website where you enter your email address to check if your address has been revealed in a data breach. [...]

Tired of Being Tracked Online? Simple Steps to Opt Yourself Out!

Tired of Being Tracked Online? Get Your Privacy Back With These Simple Tools! It seems nowadays information is readily available anywhere online.  A simple Google search will likely provide your name, address, phone number, birth date and more.  This information is not only available for all to see, it [...]

Protection on a Minimal Budget? We’ve Got You Covered With These 3 Security Tools!

Protection on a Minimal Budget? We've Got You Covered With These 3 Security Tools! So much news continues to be revolved about breaches. As overwhelming as it may seem, there are simple, low cost tools available to protect yourself from everyday attacks. We've identified 3 cost-effective things you can easily [...]

2023 IT Investments – Where to Prioritize?

Not surprisingly, cybersecurity tops the list as a priority for 2023.  According to Red Hat's 2023 Tech Outlook report, the need for cybersecurity investments was cited as a priority across a variety of technology categories including cloud infrastructure, big data and analytics, and automation.  Network security and cloud security were [...]

Your New Years Resolution – Develop a Company Incident Response Plan

This Pops Up On Your Computer Screen.  What Do You Do Next? As the world of cybersecurity continues to evolve, it is no longer an option to not have a plan in place to deal with a crisis situation.   For many companies, one isolated incident (similar to above) can [...]

Internet Explorer Bytes the Dust (almost)

Microsoft will finally end support for Internet Explorer on multiple Windows versions on Wednesday, June 15, almost 27 years after its launch on August 24, 1995. After finally reaching its end of life, the Internet Explorer desktop application will be disabled. It will be replaced with the new Chromium-based Microsoft [...]

Passwordless is Possible!

Tech giants Apple, Google, and Microsoft announced last month that they have committed to building support for passwordless sign-in across all of the mobile, desktop, and browser platforms that they control in the coming year. Effectively, this means that passwordless authentication will come to all major device platforms in the not too [...]

Latest Phishing Campaign Targets US Government, Exploits Windows Zero-Day Vulnerability

The latest vulnerability comes in the form of a phishing email, pretending to be an offer of a raise in compensation, including an attached Word Document (RTF file). Once activated, the malware then checks if the system is a virtual machine, stealing information from multiple web browsers, mail clients, and file [...]

Choosing an Effective Passphrase

Tips for Choosing an Effective Passphrase A passphrase is a password composed of a sentence or combination of words. Choosing something longer and more complex than the average password increases overall security. Be sure to include special characters and numbers in your passphrase. A passphrase should be something that [...]

Go to Top