Top

Category: Editorial


Editorial

Password Hygiene: Strong Rules Any Company Should Follow

August 29, 2020

Via: Natalie Dunn

Remote workers use countless passwords for many daily activities and tasks. Since these passwords protect the organization’s most sensitive data, cybercriminals are always making efforts to capture, compromise, or gain access to corporate devices. Luckily, there are several password hygiene […]


Editorial

VPN Best Practices for Supporting Your Teleworkers

August 29, 2020

Via: Natalie Dunn

The COVID-19 pandemic shook the business world to the core since restrictions and mandatory public health measures forced employees to work from home. As lockdowns ended, more and more businesses started to rethink in-office perks and extend their work-from-home arrangements. […]


Editorial

The Rise of Encryption: Encrypted Messengers in a Surveilled World

July 21, 2020

Via: Nick Terrence

Regardless of the political side of the situation, the curious case of Edward Snowden has proven one thing: when uncovered, government spying enables a giant push to data scrambling on the Web. Giants like Yahoo, Google, and Microsoft have substantially […]


Editorial

Protecting Your Cloud Environment Against Potential Threats

June 29, 2020

Via: Lawrence Malone

Almost every U.S enterprise today uses the cloud in some way or fashion, and with good reason—it saves money spent on hardware, gives you all the performance you need, and the high availability of the cloud provides the peace of […]


Editorial

Is Password Reuse Putting Your Business At Risk?

June 15, 2020

Via: Tailynn Gable

Every day, 99% of professionals choose convenience at the expense of their enterprise security by reusing passwords—either across work accounts or, even more alarmingly, between work and personal accounts. Taking comfort in password-protected entry points may cause any business to […]


Editorial

How to Choose the Right Unified Endpoint Management Solution

May 12, 2020

Via: Natalie Dunn

Today, many businesses use a large number of connected devices, ranging from desktop computers to barcode scanners. As IT and security leaders work around the clock to secure and maintain servers, computers, smartphones, tablets, iPads, IoT devices, virtual machines, and […]


Editorial

The Security Gaps of Deepfakes

April 29, 2020

Via: Sabrina Clark

A year ago, Jordan Peele made a video warning us of the impending spike in deepfake technology. In that video, Peele uses machine learning technology to ventriloquize Obama and appear as if Obama is saying outlandish statements. Even if such […]


Editorial

Cyberattacks During COVID-19 Crisis—Are Hospitals Secure?

April 8, 2020

Via: Natalie Dunn

The healthcare sector has witnessed a 150% increase in cyberattacks since the beginning of the year. With medical staff already overburdened and overworked by the demands brought on by COVID-19, healthcare organizations could be the perfect targets for various attacks. […]


Editorial

The Digital Cold War: What to Expect in 2020

March 30, 2020

Via: Rowena Padlock

Is your business prepared to face the new cyber cold war threat? This is becoming an increasingly pressing concern for many European and US businesses, as the reality of a digital cold war between the west and the east becomes […]


Editorial

Security Measures & Compliance Practices for eSignatures

March 9, 2020

Via: Rachel Oldford

Electronic signatures are becoming increasingly popular in the modern era since more and more companies have started to notice their multiple benefits. Speed, one of the key advantages of this solution, is what often drives people’s interest in using digital […]