DNS Layer Security
Geraldine HuntProtecting your computer network from attack requires a combination of technology, good practices and vigilance. Sadly most IT security professionals pay little attention to securing the DNS layer.
Protecting your computer network from attack requires a combination of technology, good practices and vigilance. Sadly most IT security professionals pay little attention to securing the DNS layer.
It’s easy to fall victim to phishing attacks targeting collaboration tools like Teams, the phishing page is made to look like the Teams login page. Users who do not...
Phishing is as much about human behavior as it is about technology. Cybercriminals know that tricking users into performing an action can effectively do the hard work for them.
The latest Office 365 phishing scam has three core elements that together make it a cyber-attack that is very difficult to detect and prevent.
MSPs are required to implement services required by the customer, but it’s a mistake to skip email security even if the customer claims it’s not necessary.
Over his 36 year IT career Steve Havert has encountered and overcome many IT security issues. Has ransomware been the most challenging?
For educational institutions the implications of data theft are huge: reputational, legal, economic and operational. Prosecution and other penalties can arise as well as the loss of sensitive data.
With archived emails, the organization creates an audit trail and files that cannot be altered. These two benefits are important in cyber-incident response and investigations.
Cases of ransomware attacks have increased dramatically over the last few years. Find out how you can protect yourself from these attacks.
Ransomware is one of the worst malware threats in the wild, costing millions in data loss and disaster recovery. Organizations must strengthen defenses as new variants become ever more devious.
Cyber-threats are a 360-degree problem. As such, an enterprise needs to tackle them across all entry points, including web-based attack points.
Palmerworm hackers have been hiding in corporate networks for months. Palmerworm uses a unique approach to tricking users into running malicious content.
Sign-up for email updates...
Call us on USA +1 813 304 2544 or IRL +353 91 545555
Contact Us