bring your own device (BYOD)

Bring Your Own Device (BYOD) Security Pitfalls

The Bring Your Own Device (BYOD) movement is gaining a strong…
gdpr data protection law in EU

Data Protection Laws and Cybersecurity: Mitigating the GDPR Challenge

It looks like data privacy has and will continue to be a…
ransomware attacks in various industries

7 Industries Where Hackers Are Using Ransomware

Even before WannaCry spread throughout the world at an alarming…
ciso working at business from a window

Why More Companies Are Looking for a CISO

A growing number of web and data threats has companies scrambling…
Smartest IoT devices

The 10 Smartest IoT Devices to Look Out For in 2017

According to Gartner, we should expect to see 8.4 billion…
1484806777641_1_111339 (1) (1) (1)

The Blockchain Hype

With technology advances a-plenty – what’s going to be…
DDos types include volumed based, protocol, and application layer attacks

Types of DDoS Attacks: General Breakdown

When major cyber attacks are made public, we often hear about…
six personalities and types of hackers online kids older white hat and black hat

The 6 Types of Hackers You May Come Across Online

 These days it’s easy to look at the mountain of cyber…
blog-cover-image

Tax Season: Cyber Security Defenses to Make (and Keep) Your Returns

It’s that time of year again – the time of the year where…
Data breach on laptop with warning sign

Majority of Companies Are Not Disclosing Their Data Breaches

It is a common misconception to think that companies absolutely…