People often learn lessons from past mistakes, but why do they not take this same approach with password security? Password security is no joke – read on to learn more about why people need to change their...
The benefits of using mobile devices should never compromise information security. Slow down, think before you click, and always follow your organization’s policies.
The Coronavirus has brought about some major change in our daily lives. One change that may be here to stay for some employees is Work from Home. Whether you are in the office, working from home or both, it is...
Remember ransomware, the malicious software that blocks computer access until a ransom demand is paid? The threat was huge and dominated headlines in the past but seems to have slowed down in recent months. Could the...
In today’s cyber landscape, having just one strong password on an account just isn’t enough. While we can do a lot to improve the strength of our passwords, having Two-Factor Authentication (2FA) is...
IoT (Internet of Things) devices are becoming increasingly popular as their convenience helps individuals and businesses improve many daily functions. Although their intentions are meant to make our lives easier, IoT...
COVID-19 has changed the way we work, possibly forever! The United States has seen an unprecedented shift of work moving from the work office to the home office. The WFH acronym was born.
Incident response refers to the processes an organization employs to help detect, respond to, and recover from security incidents. It’s essentially an emergency plan with step-by-step guidelines, similar to how...
With the surge of businesses switching to remote work during the pandemic, some employees are using personal devices to do their job at home. Make sure that these devices’ operating systems are up-to-date and...