Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
The Secure USB Stick—The Little Wizard of Strong Security Practices
Editorial The Secure USB Stick—The Little Wizard of Strong Security Practices

Nowadays, implementing strong security practices is more important than ever because offices are no longer stable physical locations, while the diversity of access points in organizations’ ecosystems are constantly growing. Managers are facing these challenges for the first time, and they are l

What you need to know about data privacy & 5 steps to ensure your organization stays compliant
Editorial What you need to know about data privacy & 5 steps to ensure your organization stays compliant

Data Privacy is an area of data protection that deals with the proper handling of information, focusing on compliance with data protection regulations. How data should be collected, stored, managed, and shared with any third parties—are the main concerns of data privacy. These concerns encompass t

Cybersecurity Compliance: Understanding Which Regulations Apply to Your Business
Editorial Cybersecurity Compliance: Understanding Which Regulations Apply to Your Business

Assessing which rules and regulations apply to an organization is never an easy endeavor. More often than not, companies need to comply with multiple regulations, many of which have overlapping stipulations. Understanding compliance regulations and the acceptable requirements for developing a

Data Privacy VS Data Security – Understanding the difference might save your company a lot of money
Editorial Data Privacy VS Data Security – Understanding the difference might save your company a lot of money

Almost three years after the General Data Protection Regulation (GDPR) came into force and one year after CCPA came into effect, many employees and business managers still use the terms data protection and data security interchangeably. While they share some similarities, they entail distinct

Retail Cybersecurity During Black Friday and Cyber Monday: Mitigating the Risks
Editorial Retail Cybersecurity During Black Friday and Cyber Monday: Mitigating the Risks

With Black Friday and Cyber Monday around the corner, the retail industry is heading into the busiest period of the year. Every year, cybercriminals seek to exploit the retail feeding frenzy by stepping up their attacks exponentially during the biggest shopping events of the year. The best way for

Responding to a Ransomware Attack: Dos and Don’ts
Editorial Responding to a Ransomware Attack: Dos and Don’ts

Ransomware is one of the fastest-growing malware threats, targeting every type of user – from home users to businesses, government networks, hospitals, and even city libraries. A ransomware infection is experienced immediately and its impact is often very destructive. That’s why security experts adv

Password Hygiene: Strong Rules Any Company Should Follow
Editorial Password Hygiene: Strong Rules Any Company Should Follow

Remote workers use countless passwords for many daily activities and tasks. Since these passwords protect the organization’s most sensitive data, cybercriminals are always making efforts to capture, compromise, or gain access to corporate devices. Luckily, there are several password hygiene s

Cyberattacks During COVID-19 Crisis—Are Hospitals Secure?
Editorial Cyberattacks During COVID-19 Crisis—Are Hospitals Secure?

The healthcare sector has witnessed a 150% increase in cyberattacks since the beginning of the year. With medical staff already overburdened and overworked by the demands brought on by COVID-19, healthcare organizations could be the perfect targets for various attacks. Discover the most significant

Security Measures & Compliance Practices for eSignatures
Editorial Security Measures & Compliance Practices for eSignatures

Electronic signatures are becoming increasingly popular in the modern era since more and more companies have started to notice their multiple benefits. Speed, one of the key advantages of this solution, is what often drives people’s interest in using digital signatures. However, in today’s evolving

Google’s Major iPhone Security Flaw Actually Affects More Operating Systems
Editorial Google’s Major iPhone Security Flaw Actually Affects More Operating Systems

Google’s Project Zero security task force reported that it uncovered an “indiscriminate” hacking operation that targeted iPhones for at least two years to gain access to personal files, messages, and real-time location data. According to Motherboard , it could be one of the largest attacks condu

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later