Apart from the cloud, one of today’s biggest IT trends is virtualization. An emerging model of virtualization is virtual desktop infrastructure (VDI), which involves hosting a desktop operating system and...
Read More
Google confirmed this past July that it has found a currently full-proof method for ensuring its employees do not compromise the network by being phished: physical security keys. All...
Read More
Public institutions such as hospitals have become a favorite target of hackers in recent years, especially for those deploying ransomware. However, the state of healthcare cybersecurity is affecting the...
Read More
An Oregon couple on the verge of purchasing their dream home mistakenly submitted funds meant for their real estate broker and the title insurance agency involved in the deal to...
Read More
Fall is approaching and that means that we will start spending more time indoors on our couch watching sports and TV in general. Have you ever been sitting there wanted…
A Verizon research team found that most businesses overlook their mobile cybersecurity practices, as we previously reported here. Almost a third of organizations surveyed were discovered to have sacrificed their...
Read More
Cybersecurity might be one of the last things you want to worry about while enjoying your time off, but the increasing connectivity of the world means that protecting you networked...
Read More
In February of 2018, the Securities and Exchange Commission released an updated set of guidelines for public companies in disclosing cybersecurity risks and incidents. Though this guidance was presented as...
Read More
An alert released by US Computer Emergency Readiness Team (CERT) on behalf of the National Cybersecurity and Communications Integration Center (NCCIC), a division of the Department of Homeland Security, brought...
Read More
Everyone has gadgets now. It is almost impossible to find someone with out a device that uses a rechargeable battery. The one downside to this is that these devices need…