security

Safely Selling Online Items

Where there are buyers and sellers there will be scammers and cybercriminals to keep an eye out for. In this week’s Micro Training, we will discuss online marketplaces and selling platforms so that you’ll be better equipped to face the most common scams found in these types of exchanges.

Top 3 Phishing Saves

Phishing messages come in many forms, with many different ways to catch and respond to them. To wrap up Cybersecurity Awareness Month, we’ll look at the importance of recognizing and reporting an incident by analyzing three different phishing attempts.

Cyber Stories: A Tale of Software Updates

With just the click of a button, software can be updated. However, many still ignore these update messages and leave their devices vulnerable. This week’s Micro Training follows the story of a girl who puts off updating her software. Find out how the simple task of updating software on time can help you see yourself …

Cyber Stories: A Tale of Software Updates Read More »

Two-step and two-factor authentication: What’s the difference?

Every business should have a strong cybersecurity posture to keep cybercriminals from infiltrating their network. One way to do this is by implementing a strict authentication process using two-step or two-factor authentication. These two processes are so similar that many confuse one with the other. Learn the difference between the two and how you can …

Two-step and two-factor authentication: What’s the difference? Read More »

Benefits of hybrid clouds for SMBs

Cloud solutions today are more secure, flexible, and cost-effective than ever before, which is why they have become indispensable for many small- and medium-sized businesses (SMBs). And thanks to hybrid cloud solutions, SMBs have access to even more agile computing resources. Hybrid clouds are a combination of private and public clouds. In private clouds, data …

Benefits of hybrid clouds for SMBs Read More »

Fileless malware: Are you at risk?

Over the past few years, the security industry has witnessed a rapid evolution in attack techniques, including fileless malware. Now, cybercriminals use legitimate tools and services such as existing software, applications, and authorized protocols to carry out malicious activities like unauthorized data retrieval or data damage. Left unchecked, these types of malware can adversely affect …

Fileless malware: Are you at risk? Read More »