Latest

Posts

Cyber Security

Types of Encryption: Symmetric or Asymmetric? RSA or AES?

If you’re looking to encrypt data to protect it, you might find there are different encryption methods and encryption algorithms to pick from. From RSA to AES, your pick should be informed by context.

by Nicolas Poggi

posted Jun 15 2021

Data Leakage and How to Handle It

What is Data Leakage? Data leakage is when data in an organization’s possession is made accessible to third parties without authorization.  Data leakage via digital means – email, cloud storage,…

by Norman Gutiérrez

posted May 28 2021
Cyber Security
Hacking Protection 101

Have I Been Hacked? How to Find Out and Protect Yourself

Someone is hacked every 39 seconds. That was concluded by a study by Michael Cukier from the Clark School of Engineering.  According to CyberCrime Magazine, a staggering 60% of small…

by Hugh Taylor

posted May 17 2021
Security 101

My Computer Was Hacked! 3 Things To Do Immediately

What do you do when you get hacked? Aside from panic: you react. Many can relate to this: you open an attached file and bam… Your whole computer acts like a demonic force possessed it.

by Nicolas Poggi

posted May 17 2021
Security 101

The 5 Best Business Password Managers of 2021

If there’s one thing we learned from Equifax’s catastrophic breach: many people don’t create unique passwords. The attack that occurred in September of 2017 exposed the private information of over…

by Nicolas Poggi

posted May 14 2021
Data Privacy Legislations

Windows 10: The Microsoft Bitlocker Data Encryption Guide

The surge in remote work means that off-site devices have access to highly-sensitive information.  If these devices are lost or stolen, then an attacker may gain access to the data…

by Norman Gutiérrez

posted Apr 30 2021
Data Privacy Legislations

The Complete Guide to Data Classification

Learn about what data classification is, the various types of data classification, and how to build a classification policy and process for your organization’s data. What is Data Classification? Data…

by Norman Gutiérrez

posted Apr 26 2021
Cyber Security
Remote Work

The Remote Cybersecurity Landscape | Shift: Our New Report

The first installment of our new report brings valuable insight into the status of remote workers, the evolution of cyberattacks in 2020, and the most sought-after countermeasures.

by Norman Gutiérrez

posted Apr 15 2021