Google sent users 40,000 warnings of nation-state hack attacks in 2019

Google sent users 40,000 warnings of nation-state hack attacks in 2019

Google sent users 40,000 warnings of nation-state hack attacks in 2019 Google’s threat analysis group, which counters targeted and government-backed hacking against the company and its users, sent account holders almost 40,000 warnings in 2019, with government...
Introducing Zero-Trust Access

Introducing Zero-Trust Access

Introducing Zero-Trust Access   Working remotely has been a reality for many knowledge workers for many years, enabled by the growth and development of the Internet, Wi-Fi connectivity, and mobile computing devices. Indeed, it was this trend that powered the...
Malware Infecting PC’s of Those Just Wanting More Coronavirus Infection Information

Malware Infecting PC’s of Those Just Wanting More Coronavirus Infection Information

Malware Infecting PC’s of Those Just Wanting More Coronavirus Infection Information Cybercriminals are constantly changing their tactics and creating new ways to spread their malware to hack and exploit users.  With the coronavirus acting as a pandemic and spreading...
Businesses Beware: Ransomware is on the rise, again

Businesses Beware: Ransomware is on the rise, again

Businesses Beware: Ransomware is on the rise, again Companies are under attack from Ransomware gangs and are paying a high price.  Cybercriminals who were surreptitiously using business computing resources to mine cryptocurrencies have found that with the huge drop in...
All Businesses are Tech Businesses – Like it or Not

All Businesses are Tech Businesses – Like it or Not

All Businesses are Tech Businesses – Like it or Not The world of information is remaking businesses with new technologies turning all businesses into technology companies like it or not.  Companies who continue to believe that they are not technology companies...
Keeping Legacy Software Safe

Keeping Legacy Software Safe

Keeping Legacy Software Safe The primary problem with legacy software is keeping it secure.  Many businesses are using software that was developed years ago and before many of these new attack variants were ever even considered.  That means that they were not designed...