Category

Cyber Security

Cyber Security

What is Endpoint Security?

The question “What is Endpoint Security?” seems innocent enough, but answering it triggers a few complex conversations. These span hardware and software, network architecture, network security and more. This article…

by Hugh Taylor

posted Jun 15 2021
Cyber Security

Types of Encryption: Symmetric or Asymmetric? RSA or AES?

If you’re looking to encrypt data to protect it, you might find there are different encryption methods and encryption algorithms to pick from. From RSA to AES, your pick should be informed by context.

by Nicolas Poggi

posted Jun 15 2021
Cyber Security
Hacking Protection 101

Have I Been Hacked? How to Find Out and Protect Yourself

Someone is hacked every 39 seconds. That was concluded by a study by Michael Cukier from the Clark School of Engineering.  According to CyberCrime Magazine, a staggering 60% of small…

by Hugh Taylor

posted May 17 2021
Cyber Security

Windows 10: The Microsoft Bitlocker Data Encryption Guide

The surge in remote work means that off-site devices have access to highly-sensitive information.  If these devices are lost or stolen, then an attacker may gain access to the data…

by Norman Gutiérrez

posted Apr 30 2021
Cyber Security
Remote Work

The Remote Cybersecurity Landscape | Shift: Our New Report

The first installment of our new report brings valuable insight into the status of remote workers, the evolution of cyberattacks in 2020, and the most sought-after countermeasures.

by Norman Gutiérrez

posted Apr 15 2021
Cyber Security

Phone Security: 20 Ways to Secure Your Mobile Phone

Every bit of sensible information and access now fits in the palm of our hands, inside our smartphones. Learn how to mitigate the risk that mobiles carry with them as attackers turn to target them.

by Hugh Taylor

posted Apr 06 2021
Cyber Security
Security 101

What is Data Security? Everything You Need to Know

What is Data Security? Data security is the practice of protecting corporate and customer data against unauthorized use and exposure.  It includes everything from discovering the data that a company…

by Norman Gutiérrez

posted Mar 18 2021