Latest

Posts

Data Privacy Legislations
Remote Work

Employee Monitoring: Surveillance For The Remote Work Era

For some of us, working from home is a blessing in disguise. We traded the nosy eyes of our coworkers and superiors for the peace and quiet of our home. But what about the organizations that weren’t ready for remote work? What did the pandemic cause in our bosses, accustomed to watch us every day?

by Norman Gutiérrez

posted Sep 21 2020
Cyber Security

Types of Encryption: Symmetric or Asymmetric? RSA or AES?

If you’re looking to encrypt data to protect it, you might find there are different encryption methods and encryption algorithms to pick from. From RSA to AES, your pick should be informed by context.

by Nicolas Poggi

posted Sep 16 2020
Remote Work

Working from Home Securely: A Complete Guide

It is key that remote workers separate their work/personal digital environments, and take protective measures to avoid an attack results in a chaotic domino effect that puts company and personal data at risk.

by Nicolas Poggi

posted Sep 15 2020
Cyber Security
EdTech

Why Cybersecurity Risks in K-12 Schools Are Rising

It’s clear that schools need stronger cybersecurity at this time. This should include countermeasures like effective access controls for the network, especially for the “privileged” administrative back end of school databases

by Hugh Taylor

posted Aug 21 2020
Cyber Security
EdTech
Hacking Protection 101

Endpoint Security Tools: EPP vs EDR

EPP vs EDR – which should you choose? Prey goes through the differences to help you make an informed decision about your endpoint security.

by Nicolas Poggi

posted Aug 13 2020
Cyber Security

Best Practices for Endpoint Security

As more people work outside the traditional office environment, endpoint devices are emerging as one of the biggest potential weaknesses in the corporate security chain. In fact, according to the…

by Nicolas Poggi

posted Aug 10 2020