Cybersecurity

Password Hacks: Strength in Numbers (and letters and symbols)

Password Hacks: Strength in Numbers (and letters and symbols)

It’s the end of a long workday – time to head home! Pack up your things, kill the lights, and latch the front door with Velcro. Sounds ridiculous, right?

We go to great lengths to prevent physical break-ins, but unfortunately, many passwords used today are about as secure as that Velcro. Understand your enemy and learn tips to create secure passphrases.

Ransomware: Much More Than The King’s Ransom

Ransomware: Much More Than The King’s Ransom

Ransomware is really a new take on an old crime. Ransomware is a type of malicious software that hackers install to encrypt your data and files, rendering systems unusable until you pay the ransom demand.

Believe it or not, demands aren’t always egregious. Paying the ransom is only a fraction of the true cost. Hidden costs are what really hurt, like downtime and brand damage.

IT Superheroes: Part Firefighter, Part Freedom Fighter, All Human

IT Superheroes: Part Firefighter, Part Freedom Fighter, All Human

They’re computer whizzes, trusted advisors, and downright magicians all at once. IT professionals are the unsung heroes that keep the company engine running. But just like the rest of us, they’re only human. Can we really expect them to take on all aspects of cybersecurity too?

The Right, and Privilege, to Remain Private

The Right, and Privilege, to Remain Private

We hope you had a wonderful 4th of July! Fireworks were booming, grills were blazing, and cameras were popping.

Social media is a fun and convenient way to show off your photos and connect with others, something many of us do personally and professionally. But we’re a little more hesitant today than we were last Independence Day, and starting to wonder what Privacy is and whether or not it exists anymore.