Missing Updates on Applications Creates Vulnerabilities

Missing Updates on Applications Creates Vulnerabilities

Missing Updates on Applications Creates Vulnerabilities   Avast’s PC Trends Report 2019 found that users are making themselves vulnerable by not implementing security patches and keeping outdated versions of popular applications on their PCs. The applications...
IoT – Putting our Business Networks and Security at Risk

IoT – Putting our Business Networks and Security at Risk

IoT – Putting our Business Networks and Security at Risk   IoT – Putting our Networks and Security at Risk Just take a look at any website or catalog, and you will see the availability of hundreds to thousands of connected devices touted to make your...
Turns Out It Wasn’t Just Capital One

Turns Out It Wasn’t Just Capital One

Turns Out It Wasn’t Just Capital One   Federal prosecutors say a woman charged in a massive data breach at Capital One may have hacked more than 30 other organizations. Paige Thompson, of Seattle, was arrested last month after the FBI said she obtained personal...
Phishing — Best Practices

Phishing — Best Practices

Phishing — Best Practices   One of the most persistent security challenges is phishing. This is true for both organizations and individuals. Whether gaining access to credit card information, security passwords, or any other sensitive information, hackers can use...