Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Password Hygiene: Strong Rules Any Company Should Follow
Editorial Password Hygiene: Strong Rules Any Company Should Follow

Remote workers use countless passwords for many daily activities and tasks. Since these passwords protect the organization’s most sensitive data, cybercriminals are always making efforts to capture, compromise, or gain access to corporate devices. Luckily, there are several password hygiene s

Cyberattacks During COVID-19 Crisis—Are Hospitals Secure?
Editorial Cyberattacks During COVID-19 Crisis—Are Hospitals Secure?

The healthcare sector has witnessed a 150% increase in cyberattacks since the beginning of the year. With medical staff already overburdened and overworked by the demands brought on by COVID-19, healthcare organizations could be the perfect targets for various attacks. Discover the most significant

Security Measures & Compliance Practices for eSignatures
Editorial Security Measures & Compliance Practices for eSignatures

Electronic signatures are becoming increasingly popular in the modern era since more and more companies have started to notice their multiple benefits. Speed, one of the key advantages of this solution, is what often drives people’s interest in using digital signatures. However, in today’s evolving

Google’s Major iPhone Security Flaw Actually Affects More Operating Systems
Editorial Google’s Major iPhone Security Flaw Actually Affects More Operating Systems

Google’s Project Zero security task force reported that it uncovered an “indiscriminate” hacking operation that targeted iPhones for at least two years to gain access to personal files, messages, and real-time location data. According to Motherboard , it could be one of the largest attacks condu

How to Choose the Right Data Recovery Software
Editorial How to Choose the Right Data Recovery Software

Data loss is one of the most damaging things that can happen to a business. Losing crucial files and sensitive business information can be costly, whether it’s through human error, cyber-attacks, natural disasters, or faulty equipment. Data backup is the first line of defense against accidental i

Vulnerable or Not? How Your Employees Respond to Cyber Threats
Editorial Vulnerable or Not? How Your Employees Respond to Cyber Threats

With the risk of a cyberattack now being classified as the top threat to organizations, companies all around the globe are still hesitant to spend money to improve their security systems or train their employees. Security threats can put an organization and its customers’ sensitive information at r

Smart Tech: Why Device Owners Must Take Security into Their Own Hands
Editorial Smart Tech: Why Device Owners Must Take Security into Their Own Hands

The growing array of devices that can be connected to the internet causes consumers to be increasingly susceptible to cybercrime. Every smart TV or networked lightbulb we set up in our home or office can become a silent soldier sent by hackers to the global battlefield of cyberwarfare. The global

Combatting the Growing Threat of Ransomware
Editorial Combatting the Growing Threat of Ransomware

Given the current cybersecurity environment and the increasing sophistication of ransomware, getting to threats before they can have a business impact is more important than ever. If you find yourself questioning whether to pay a ransom, you’ve already lost the battle. But you don’t have to lose the

AI in cyber-security – or is it its mature counterpart, AGI?
Editorial AI in cyber-security – or is it its mature counterpart, AGI?

Many cyber-security professionals are waiting for the next stage of Artificial Intelligence-based algorithms. Ready to fight with what we may call automated malicious attacks, AI is yet in its testing phase, showing up in demos and uncoordinated software. It’s like the peripheral nervous system, w

Adaptive security, the smart way to protect systems
Editorial Adaptive security, the smart way to protect systems

MarketsandMarkets, as quoted by Help Net Security , recently reported that the adaptive security market will gain considerable traction in the next five years. This success comes from the need to defend networks and IT systems against advanced threats. The expected growth in numbers would be from

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later