Best Messaging Apps to Keep Your Data Private and Secure
WhatsApp’s refusal to re-evaluate their privacy policy has caused many people to look elsewhere – here are some apps and tipps to keep your data private and secure.
Read more...WhatsApp’s refusal to re-evaluate their privacy policy has caused many people to look elsewhere – here are some apps and tipps to keep your data private and secure.
Read more...The recent ransomware attacks on critical infrastructure services could not have demonstrated more clearly how interwoven the IT environment is with the control of production plants today. By isolating both worlds, a Zero Trust approach provides the required security for these environments while still ensuring secure connectivity.
Read more...Smishing is the latest and growing version of phishing. In this case, it is using text messaging platforms to gather passwords and identities and deliver malware. Read more in our article and the latest Crucialtech podcast.
Read more...elf-righteous, but they are imaginative in looking for new ways to rip you off. That’s why we are launching this special series, Scam Bucket , to keep you up to date on the latest trends in cybercrime.
Read more...The combination of the disappearance of the gangs, including REvil as of last week, and the newfound reticence of victims to pay up, is feeding the “peak ransomware” conjecture.
Read more...Today is World Password Day. Read what the industry has to say here at Cyber Protection Magazine. With qutoes from Nexsan, Retrospect, DH2i, Tanium, Thales and Thycotic.
Read more...CDR technology is rapidly becoming one of the most sought-after market segments in cybersecurity. Which is not surprising, given the benefits of CDR – read how CDR improves files security in this article.
Read more...World Backup Day has acts as a reminder for people to prepare for the unexpected by backing up their important files. Every year we see horror stories because a backup hasn’t been there when needed. Cyber Protection Magazine spoke to five technology experts to learn more about why effective backup is key to a successful disaster recovery plan.
Read more...Traditional perimeter security are no longer a good fit for todays changing threats. Learn about SASE, a new way of approaching cybersecurity.
Read more...