Bolstering Workforce Security During Summer Holidays
While we all crave relaxed summer getaways, it’s crucial to understand that adversaries never go on vacation.…
Read more...While we all crave relaxed summer getaways, it’s crucial to understand that adversaries never go on vacation.…
Read more...When they discuss issues in meetings, we all agree on a passphrase for whatever decision maker is chosen. It’s not shared in emails, texts, or phone conversations and only two or three people are authorized to use them.
Read more...The wave of DDoS attacks that flood the Internet daily made everyone aware of the relevance of tDDoS attacks. The question is how to properly protect yourself and what mistakes to avoid.
Read more...Today is Safer Internet Day and we thought we’d try a bit of click-baiting. That explains the headline and, coincidentally, also what this article is all about.
Read more...Ever heard of Franken-phish? It’s a campaign that targets Microsoft 365 users. It sells kits comprised of components of other kits readily available on the Internet, hence the term “Franken-phish.” Read about it in our latest Scam Bucket Article.
Read more...The recent ransomware attacks on critical infrastructure services could not have demonstrated more clearly how interwoven the IT environment is with the control of production plants today. By isolating both worlds, a Zero Trust approach provides the required security for these environments while still ensuring secure connectivity.
Read more...Smishing is the latest and growing version of phishing. In this case, it is using text messaging platforms to gather passwords and identities and deliver malware. Read more in our article and the latest Crucialtech podcast.
Read more...elf-righteous, but they are imaginative in looking for new ways to rip you off. That’s why we are launching this special series, Scam Bucket , to keep you up to date on the latest trends in cybercrime.
Read more...Cyber Protection Magazine is proud to introduce a new series of articles explaining fancy terms of cybersecurity. We will keep them short, to the point and with a good dose of humor.
Read more...Since the introduction of cloud computing it has been touted as a “more secure” option than local servers. As the number of data breaches in the cloud grow, however, that may no longer be the case. Just as in all cases of security failures, human error is at the core.
Read more...