Security

This section includes all content realed to threats and information assurance, especially from the perspective of an enterprise IT environment.




Cloud security is a serious issue; how has the cloud changed the cybersecurity game?

How Cloud Computing is Changing Cybersecurity


Learn why enterprise printers have curiously become one of the top concerns for cybersecurity defense.

Are Your Enterprise Printers Protected from Cybercriminals?


Virtually every business, regardless of size, is susceptible to an attack. These five beginner-friendly, flexible online courses will give...

Cybercrime Is a Threat to Every Business: Protect Yours With These 5 Courses


The cyberthreat landscape is not limited to big businesses anymore, and even smaller businesses have become easy targets that many hackers...

Cybersecurity and You: Why Learning Now Will Pay Off Later (6 Courses to Choose)


Deleting data doesn’t necessarily mean that it’s permanently gone. Here are some methods for keeping your private data out of the wrong...

Never Really Gone: How to Protect Deleted Data From Hackers


All hackers are bad people who make a living by stealing your personal information and installing Trojan horses and keyloggers on your...

6 Myths About Hacking That May Surprise You


Like all new technologies, it can be difficult to separate fact from fiction in the case of blockchain. Here we examine some of...

Debunking the Top 5 Blockchain Myths


The business application space has become saturated by thousands of SaaS solutions that cater to virtually every business need. According...

Redefining IT Decision-Making in the Age of SaaS


Cybercriminals have become quite creative in finding ways to victimize users. There’s now a dizzying array of attack methods that hackers...

How to Find and Remove Camera Malware


Many have heard tidbits about the acronym “GDPR,” but do not understand the regulation. Surprisingly, even without locations or...

GDPR: Do You Know if Your Organization Needs to Comply?


More IoT devices are constantly being released, many of which now track our whereabouts or online activities. Although incredibly...

6 Tips for Securing an IoT Device


Instead of trying to create a wall around an entire private system, more security professionals and companies are focusing their security...

Information Security: Understanding and Securing the New Perimeter


Privacy in tech is growing into a pressing issue. People are rightfully concerned with how their information is stored and handled by the...

10 Quotes About Tech Privacy That'll Make You Think


Cybersecurity professionals are looking at AI with both enthusiasm and trepidation. It has the potential to add new layers of defense for...

Are Hackers Using AI for Malicious Intentions?


When hacking occurs in a data center, the worst that can happen is a loss of data. When a self-driving car is hacked, what can happen is a...

Hacking Autonomous Vehicles: Is This Why We Don't Have Self-Driving Cars Yet?


Two-factor authentication (2FA) has become increasingly important in health care. While the technology is not mandatory under HIPAA, it has...

Two-Factor Authentication: A Top Priority for HIPAA Compliance


Attackers aren’t always looking for an immediate payoff: For the first time ever, a remote access Trojan (RAT), which enables hackers to...

Remote Access Trojan Attacks on the Rise - How You Can Protect Yourself


The internet of things (IoT) is connecting more and more devices every day. While this may mean enhanced convenience for consumers, it also...

Hacking the IoT: Vulnerabilities and Prevention Methods


The General Data Protection Regulation is meant to combat a reality experienced by everyone on the internet: Data isn’t private or safe....