Category

Cyber Security

Cyber Security

The Essentials to IT Cybersecurity Guide

Cybersecurity is meant for any kind of organization. Software developers, schools, hospitals, and retail are all subject to vulnerabilities that put their data, personnel, and resources at risk. Kickstart your IT cybersecurity strategy with this free introductory eBook on best practices, common threats, and security frameworks!

by Nicolas Poggi

posted Aug 23 2021
Cyber Security
Hacking Protection 101

How to Tell If Your Computer Has Been Hacked

Hacking, most of the times, isn’t personal. Hackers carry out massive campaigns and you might just be unlucky! Learn how to detect it, and how to react.

by Hugh Taylor

posted Aug 11 2021
Cyber Security

10 books every IT Manager should read

Free time and a good reads are the best partners of any IT Manager who wants to succeed and grow in their position, don’t lose the habit!

by Nicolas Poggi

posted Aug 10 2021
Cyber Security
Introduction to Cybersecurity

What Are Cyber Threats and What to Do About Them

From infiltrations on infrastructure and data breaches to spear phishing and brute force. Online threats are varied and they don’t discriminate organizations from individuals when looking for a target.

by Hugh Taylor

posted Jun 16 2021
Cyber Security

Endpoint Security Risks – Why It Matters Now More Than Ever

As businesses shift to a decentralized working environment amid the coronavirus pandemic, the risks of network intrusion and data breaches multiply. Endpoint security risks have become a major factor in company security. Here’s why endpoint security matters more than ever in a post-pandemic world.

by Nicolas Poggi

posted Jun 15 2021
Cyber Security

What is Endpoint Security?

The question “What is Endpoint Security?” seems innocent enough, but answering it triggers a few complex conversations. These span hardware and software, network architecture, network security and more. This article…

by Hugh Taylor

posted Jun 15 2021
Cyber Security

Types of Encryption: Symmetric or Asymmetric? RSA or AES?

If you’re looking to encrypt data to protect it, you might find there are different encryption methods and encryption algorithms to pick from. From RSA to AES, your pick should be informed by context.

by Nicolas Poggi

posted Jun 15 2021
Cyber Security
Hacking Protection 101

Have I Been Hacked? How to Find Out and Protect Yourself

Someone is hacked every 39 seconds. That was concluded by a study by Michael Cukier from the Clark School of Engineering.  According to CyberCrime Magazine, a staggering 60% of small…

by Hugh Taylor

posted May 17 2021
Cyber Security
Remote Work

The Remote Cybersecurity Landscape | Shift: Our New Report

The first installment of our new report brings valuable insight into the status of remote workers, the evolution of cyberattacks in 2020, and the most sought-after countermeasures.

by Norman Gutiérrez

posted Apr 15 2021