Security and Compliance

Password Protection 101 1024 684 Managed Solution

Password Protection 101

By Duncan Meadows One upper case, one lower case, a few numbers with a combination of symbols, and must be complex with 8 to 16 characters long. Sound familiar? You…

read more
security-available-to-protect-yourself
What Kind of Security Is Available to Protect Yourself 700 425 Managed Solution

What Kind of Security Is Available to Protect Yourself

There is no denying the fact that cyber attacks are increasing at an almost exponential rate. As people become even more connected to technology, the opportunity for hackers to take…

read more
IT-Security-101
IT Security Basics – What You Need to Know 700 425 Managed Solution

IT Security Basics – What You Need to Know

There is much to unpack here, but we will try to keep it as short and easy-to-understand as possible. Information technology (IT) security encompasses a large area, making it somewhat confusing…

read more
types-of-cyber-attacks
The Many Different Types of Cyber Attacks 700 425 Managed Solution

The Many Different Types of Cyber Attacks

Cyber attacks are all too frequent nowadays. In 2010, there were roughly 3.8 million breached records. 2016 saw that number balloon to 3.1 billion. What’s more, there are numerous types…

read more
data-breaches
Data Breaches Are Increasing Faster Than Ever 700 425 Managed Solution

Data Breaches Are Increasing Faster Than Ever

Today’s society is more connected than ever before. No other time in human history could someone in India conduct a video call with someone from the United States while walking…

read more
3 Reasons Why Companies Need IT Security 1024 576 Managed Solution

3 Reasons Why Companies Need IT Security

We live in a time and age where companies need IT security like fish need water. It’s the undeniable truth of our modern-day society that no industry should go without…

read more
4 Types of Phishing Attacks and How to Protect Yourself Against Them 1024 576 Managed Solution

4 Types of Phishing Attacks and How to Protect Yourself Against Them

In a survey conducted by Tripwire of 200 security professionals, 58% have said that their respective organizations had seen a steep increase in phishing attacks in 2016. Despite that increase, most…

read more
How to Tell When You Receive a Phishing Email 1024 576 Managed Solution

How to Tell When You Receive a Phishing Email

As of 2018, ransomware is at an all-time high. It accounted for 39% of all malware-related breaches, and it continues to do so at an alarming rate. People continue to fall…

read more
Explained: General Data Protection Regulation (GDPR) 1024 576 Managed Solution

Explained: General Data Protection Regulation (GDPR)

At its very core, the General Data Protection Regulation (GDPR) is a set of new regulations which were explicitly designed to give EU citizens more control over their data. It…

read more
Hacking Vulnerability in All WiFi Networks 1024 576 Managed Solution

Hacking Vulnerability in All WiFi Networks

The security protocol that isvused to protect the vast majority of wifi connections has been broken, potentially exposing wireless internet traffic to malicious eavesdroppers and attacks, according to the researcher…

read more