Overcoming the Critical Cybersecurity Talent Shortage

Overcoming the Critical Cybersecurity Talent Shortage

Overcoming the Critical Cybersecurity Talent Shortage Businesses are in Crisis mode, and it is going to get worse. Currently have more open cybersecurity jobs available than we have people to fill them, and these numbers will continue to expand in the years ahead. And...
Your Zoom Account is Worth One ‘Copper’ to Hackers

Your Zoom Account is Worth One ‘Copper’ to Hackers

Your Zoom Account is Worth One ‘Copper’ to Hackers Zoom has gained popularity during this pandemic’s require shelter in their homes. However its widespread use has unveiled to many the privacy and security issues inherent in this platform. These inherent...

Time to Invest in Cybersecurity

Time to Invest in Cybersecurity Every company no matter the size is at high risk for a cyberattack.  With more and more third party and cloud business applications run the larger the risks which means that they must prepare for the next evolution of cybercrime.  Much...
How to Evict Attackers Living Off Your Land

How to Evict Attackers Living Off Your Land

How to Evict Attackers Living Off Your Land Why invest in top-shelf malware just to have it be turned away by antivirus tools again and again? Why launch a cyberattack like that when your target is already full of perfectly good attack tools, just waiting for you?...
Google sent users 40,000 warnings of nation-state hack attacks in 2019

Google sent users 40,000 warnings of nation-state hack attacks in 2019

Google sent users 40,000 warnings of nation-state hack attacks in 2019 Google’s threat analysis group, which counters targeted and government-backed hacking against the company and its users, sent account holders almost 40,000 warnings in 2019, with government...
Introducing Zero-Trust Access

Introducing Zero-Trust Access

Introducing Zero-Trust Access   Working remotely has been a reality for many knowledge workers for many years, enabled by the growth and development of the Internet, Wi-Fi connectivity, and mobile computing devices. Indeed, it was this trend that powered the...