There is a misconception that I have come to see in my time working in IT that is more prevalent than any other: We are safe because we are small. Small businesses feel like they are shielded because they are small and not a known or big named target. This
Read MoreSo you think proper security is too expensive. We hear this a lot. But, a company doesn't need to use every security solution out there to be properly protected. It comes down to the level of risk that you're trying to mitigate. If you follow security and cyber security news,
Read MoreFirewalls have been around for about 20 years now. They emerged more prominently as the Internet became commercialized and more networks and people connected--which meant more targets. Having a firewall is pretty much a mainstay today. You will find dedicated firewall appliances or Internet routers with so-called firewall capabilities. These
Read MoreTSB Technologies, Inc., a company dedicated to developing advanced cyber security products for the SMB market, announces the launch of SENT, their encrypted file transfer SaaS application, which will enable small to medium-sized businesses and consumers to securely send their files without the cost or complications of an enterprise level
Read MoreCompanies and people often "place" files on storage like S3 and DropBox and it doesn't get cleaned up after the files are used, leaving the data and the privacy of the subjects of that data to be vulnerable like this study proved. Instead of storing the data for temporary use,
Read MorePasswords are becoming increasingly painful to remember. Creating them and remembering them for every single thing we are signed up to can be tedious and with reports of sensitive data being compromised due to hackings of reputable companies, the need for a password manager has never been greater. Here's an article
Read More"Kill Chain," was a term originally used by the military to define the steps the enemy uses to attack a target. In the same way, a "Cyber Kill Chain," is a similar notion but relates to cyber-based attacks. It's a process that centres around understanding each of these stages so
Read MoreThe main reason for using USB sticks is to transfer data from one computer to another. It may not necessarily be to even give to someone else, but to take home to do some work or move onto a laptop before going on a business trip. USB sticks are prone
Read MoreEven though we’d like to think we’ve taken all precautions when it comes to securing our business, hackers continually evolve and find innovative ways to find the vulnerabilities in modern business networks. Here’s an article by Martin Horan from FTP Today that talks about what you can do to
Read MoreA recent tweet from UK politician Nadine Dorries set cause for alarm. Her tweet was an attempt to defend fellow political Damien Green who was recently in the spotlight for allegedly accessing porn using his government login. Here is a screenshot of the tweet: Read More