Hugh J.
Hugh Taylor is a Certified Information Security Manager (CISM) who has written about cybersecurity, compliance, and enterprise technology for such clients as Microsoft, IBM, SAP, HPE, Oracle, Google, and Advanced Micro Devices. He has served in executive roles at Microsoft, IBM, and several venture-backed technology startups. Hugh is the author of multiple books about business, security, and technology
Is your computer hacked? Learn how to find out if you’ve been hacked, what to do, who to call, and how to prevent being a victim again.
Discover essential tips to safeguard your phone from hackers and threats. From app security to data protection, learn how to boost your phone’s defenses.
This is a complete guide on endpoint device security. Learn what it is, how it works, and the positive impact it can make on your organization.
Explore the challenges faced by cybersecurity for K12 schools as they grapple with increasingly common attacks and their profound impact on students and staff.
Discover the importance of data encryption. Protect your information by learning the benefits, methods, and best practices for data security.
Learn how to detect if you've been hacked and the steps to take to stop further damage, based on findings from a cybersecurity study.
Implementing zero trust security layering techniques
Learn all about cyber security and why it's an urgently important topic for individual users, businesses, and government.
Billions of accounts and data points have been compromised in the past year, learn how it happened and how to minimize the fallout.