Best Practices in Authentication Still Mostly Ignored By Businesses

Best Practices in Authentication Still Mostly Ignored By Businesses

Best Practices in Authentication Still Mostly Ignored By Businesses How do cybercriminals breach into corporate systems?  They use many tactics but on of the easiest is through the use of compromised credentials.  The problems is that these are real valid credentials...
Job Dissatisfaction is prominent among IT Security Professionals

Job Dissatisfaction is prominent among IT Security Professionals

Job Dissatisfaction is prominent among IT Security Professionals   Many Cybersecurity professionals love a challenge.  They do not enjoy the doldrums of make work security.  They long for excitement and challenging work. They are in demand so it is not suprising...
Cyberbreaches cause Small Businesses to Close

Cyberbreaches cause Small Businesses to Close

Cyberbreaches cause Small Businesses to Close   Cybercriminals have found a lucrative new target – the small business.  Unfortunately, for a tenth of them the breach meant closing their doors forever. The impacts on small businesses is excentuated greatly....
National Security and the Chinese-based Social App TikTok

National Security and the Chinese-based Social App TikTok

National Security and the Chinese-based Social App TikTok   Have you or Do your kids use TikTok?  TikTok is a wholely owned Chinese based video platform that is popular in social media circles. It boast a user base of a half-a-billion. What the government is...
Lawfirm Software attacked by Ransomware

Lawfirm Software attacked by Ransomware

Lawfirm Software attacked by Ransomware   Legal offices use case management software to assist them in preparing for trials.  One of the largest providers is a company called TrialWorks. Unfortunately, a cybercriminal was able to launch a REvil/Sodinokibi...
Oops —- We Designed Technology to be Unpatchable

Oops —- We Designed Technology to be Unpatchable

Oops —- We Designed Technology to be Unpatchable   IoT or Internet of Things devices are becoming more and more popular.  It seems that all types of items we never considered to require connectivity are now connected to the internet.  They are constantly passing...
Malcare WordPress Security