Helen Laidlaw

Helen Laidlaw

IT Systems Analyst
Helen Laidlaw is a tech expert specializing in IT security, networking, and development. Helen provides comprehensive insights into securing digital assets, crafting efficient software solutions, and optimizing network performance. Covering a wide variety of technical topics, she employs an accessible communication style, lending her content as an indispensable resource for anyone trying to navigate the complexities of modern technology.
How to Win at Website Security – Explore the Most Secure CMS Platforms
Editorial How to Win at Website Security – Explore the Most Secure CMS Platforms

When it comes to website security, you can’t compromise. The COVID-19 pandemic has brought with it a  600% raise in cybercrime compared to the previous year. These cyber attacks consisted of sophisticated phishing emails that took advantage of worldwide network security vulnerabilities.    In this n

4 Software Security Trends to Follow This Year
Editorial 4 Software Security Trends to Follow This Year

Software security is dealing with new challenges since the shift to remote work has happened. IT security professionals must evolve and adapt in order to keep up with the requirements of cloud computing and IoT technologies. In a remote environment filled with endpoint networks, security is

Is Password Reuse Putting Your Business At Risk?
Editorial Is Password Reuse Putting Your Business At Risk?

Every day, 99% of professionals choose convenience at the expense of their enterprise security by reusing passwords—either across work accounts or, even more alarmingly, between work and personal accounts. Taking comfort in password-protected entry points may cause any business to unexpectedly l

The Security Gaps of Deepfakes
Editorial The Security Gaps of Deepfakes

A year ago, Jordan Peele made a video warning us of the impending spike in deepfake technology. In that video, Peele uses machine learning technology to ventriloquize Obama and appear as if Obama is saying outlandish statements. Even if such videos appear as amusing, the implications that deepfake

New Executive Order Is Bad News for Huawei and Its Partners
Editorial New Executive Order Is Bad News for Huawei and Its Partners

The past days have brought bad news for Huawei—and the worst might be yet to come. President Trump issued an executive order giving the federal government the power to bar American companies from doing business with foreign suppliers that could pose a threat to national security. Chinese firm H

7 Security Trends to Watch in 2019
Editorial 7 Security Trends to Watch in 2019

For most people, a new year means a fresh start. For security managers, each year brings a new wave of increasingly sophisticated cyber threats—and staying on top is not easy. Cybercriminals are constantly innovating and finding new ways to compromise corporate data, and staying one step ahead is t

Microsoft Admits that Some Windows 10 Users Are Getting Unstable Patches
Editorial Microsoft Admits that Some Windows 10 Users Are Getting Unstable Patches

Normally, updating system software as frequently as possible would be a good thing. You get new features, patch bugs, and keep your security software up to date with the latest threats. Unfortunately, in the case of Windows 10, it’s a bit more complicated. According to a recent Microsoft blog post

Why Phishing Is Still Your Number One Security Foe
Editorial Why Phishing Is Still Your Number One Security Foe

91% of cyberattacks start with a phishing email . Why are they still so prevalent – and successful? It seems like every day another high-ranking employee falls for a scam and loses millions in company money. How long have security experts been fighting phishing attacks? How much damage can they c

All You Need to Know About the Data Protection Officer
Editorial All You Need to Know About the Data Protection Officer

The EU’s General Data Protection Regulation will take effect in May 2018. The Regulation governs the privacy practices of any company processing EU citizens’ data, whether or not that company is located in the EU. One of the GDPR’s requirements is that public authorities and companies processing per

Beyond Incident Response: Beating the Cyberattack Predictions  of 2017
Editorial Beyond Incident Response: Beating the Cyberattack Predictions of 2017

It would be a severe understatement to say the cyber-landscape has drastically shifted in the past several years. From mere nuisance to real threats on real lives, cyberattacks have grown to be a paramount the issue – and not just for the small-to-medium sized company, but for gigantic c

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later