• Nov 06
    2018
    The invention of artificial intelligence has undoubtedly been one of the most noteworthy technological advancements of the 21stcentury. As it has already infiltrated nearly every enterprise and industry of today, companies are using this technology to their advantage and amplifying their abilities – including the world of cybersecurity. Although it has definitely begun to make its mark on the industry as a whole, cybersecurity experts do not believe that artificial ...
  • Oct 11
    2018
    When members of the general population are asked what they think about when it comes to artificial intelligence, thoughts of science fiction movies, robots, and flying cars typically come to mind. AI is thought of as an idea of the future, not the now. However, this could not be further from today’s reality. Between our laptops, smartphones, and cars, artificial intelligence is actually part of our everyday lives already even ...
  • Oct 03
    2018
    Social media, both company profiles and employee profiles, can have a huge impact on your business as a whole. While the platforms themselves may not be actual threats, employees who ignore the rules and best practices of security while on these accounts may make it easy for cybercriminals to hack their accounts. With security in mind, here are five simple tips that will only take a few minutes to complete ...
  • Sep 13
    2018
    From your thermostat and refrigerator to your television and watch, every household item seems to be smarter nowadays thanks to the Internet of Things. As these devices become more and more popular, hackers have and will continue to search for ways to compromise these connections. This means that the need for constant vigilance and awareness of cybersecurity is more important than ever. With that being said, do you know where ...
  • Aug 21
    2018
    Every day that goes by means that cyber threats are growing in intensity, danger, and frequency. It is the unfortunate truth that organizations are failing to keep up with these new threats as they continually struggle with new and increased regulations, a terrifying skills shortage, and new innovative cyberattack methods. If the next few years are anything like the past few have been, we will find ourselves in a hyper-connected ...
  • Jul 24
    2018
    You could put millions of dollars into software and systems to help protect your company from every known cyberattack method out there and still have a data breach occur. How could this possibly happen? The answer comes down to simple human error. There is not a single firewall or system that can prevent a human from clicking on a phishing link, losing an unsecured company cell phone or tablet, or ...
  • Jul 20
    2018
    The first six (almost seven) months of 2018 have thankfully been a bit quieter in terms of global ransomware attacks and government leaks compared to last year, which is good news. Unfortunately, that’s where the good news stops when it comes to cybersecurity in 2018. In just the first half of this year, we have seen that critical security infrastructure is barely hanging on and state-based hackers are getting more ...
  • Jul 10
    2018
    Unfortunately, there seems to be a misconception that once a cyberattack occurs, there is not much that can be done to fight back against the attackers. This couldn’t be further from the truth. After a data breach or cyberattack descends on your organization, there are thankfully several active defense steps that you can take to minimize the amount of havoc caused by cybercriminals. These steps are focused on detecting attacks ...