Category

Cyber Security

Cyber Security
Introduction to Cybersecurity

What Are Cyber Threats and What to Do About Them

From infiltrations on infrastructure and data breaches to spear phishing and brute force. Online threats are varied and they don’t discriminate organizations from individuals when looking for a target.

by Hugh Taylor

posted Jan 22 2020
Cyber Security

24 Cybersecurity Statistics That Matter In 2019

The cyber-threat scene is ever-changing. Stay up to date with this year’s malicious trends to ensure your business’ infrastructure isn’t caught off guard.

by Nicolas Poggi

posted Jan 22 2020
Cyber Security
Hacking Protection 101

Have I Been Hacked? How to Find Out and Protect Yourself

Have you? If you’re unfortunately on the positive end of this question, you should take action! Hackers usually need continued access to your accounts, so cut them off while you still can.

by Hugh Taylor

posted Jan 09 2020
Cyber Security

Utilizing Zero Trust Security to Create New Layers of Network Protection

What is Zero Trust security? In a nutshell, it is a way of approaching all types of digital and physical security, in which there are no preferences, no white-lists, and no trusted actors. All actors, both internal and external, are treated as possible threats and ‘blocked’ by default, applying the same high security protocols, access controls, and barriers for everyone.

by Hugh Taylor

posted Nov 29 2019
Cyber Security

The Essentials to IT Cybersecurity Guide

Cybersecurity is meant for any kind of organization. Software developers, schools, hospitals, and retail are all subject to vulnerabilities that put their data, personnel, and resources at risk. Kickstart your IT cybersecurity strategy with this free introductory eBook on best practices, common threats, and security frameworks!

by Nicolas Poggi

posted Sep 05 2019
Cyber Security
EdTech

Why Cybersecurity Risks in K-12 Schools Are Rising

It’s clear that schools need stronger cybersecurity at this time. This should include countermeasures like effective access controls for the network, especially for the “privileged” administrative back end of school databases and email systems.

by Hugh Taylor

posted Aug 12 2019