Blog

Blog

3 Cybersecurity Resolutions to Survive 2021

Predicting a global pandemic that reshaped how we interact with each other and our devices at a fundamental level would be nigh impossible, but we have seen an acceleration in the shift to cloud-based services. This shows the adaptability of organizations looking to evolve and thrive during an unprecedented event. However, this shift has also left some businesses vulnerable to exploitation. My one-line forecast is that we should expect a cloud migration trend to continue or even accelerate in 2021

Read More >

Searching for HTTPS

HTTP vs. HTTPS: How one letter can make a difference

Searching for HTTPSYou probably overlook it, and yet that letter protects your data every day. On March 12, 2021, the World Wide Web celebrates its 32nd birthday. But time passes for everyone,  and in the past three decades, the miraculous communication between systems that you are using right now has changed dramatically. That “www” you see before website domains representing the World Wide Web is now accompanied by even more acronyms. I’m talking about HTTPS, that something that helps keep you secure.

Read More >

receiving a harsh truth about passwords

The harsh reality about your password practices

receiving a harsh truth about passwordsYou reuse passwords, add exclamation marks to them, and are confident you won’t be hacked. Have a seat, we’ve been waiting for you. You are looking for a book. It’s not on Amazon; it’s not on Indigo. But it’s on this website you’ve never seen before, so you create an account and go to the checkout. It asks for a password and, after thinking hard for two seconds, you type Letmein1!, your favorite default password for one-off accounts like this.

Read More >

What’s in today’s cybercriminal’s toolbox? Let’s open it.

Cyber fraud is a catch-all term for endless schemes to fool users into giving assets access to their data or information. Each ploy has its own personality and tools. Today we take a closer look. The goal of cyber fraud schemes is the same: impersonate legitimate users or companies and collect sensitive information or assets for monetary gain. As cyberattacks become the norm, they rely on common techniques and tools to reach their goals. Here are some examples, as seen

Read More >