Healthcare: Prevent insider threats

Healthcare is the only industry where insider threats pose the greatest threat to sensitive data, with 58 percent of security…

Virtual DR: The best anti-ransomware tool

From CryptoLocker to WannaCry, ransomware has grown in sophistication and scope over the past few years. And given its widespread…

The risks of auto-complete passwords

If you’re disturbed by advertisements and “helpful” suggestions that are based on your internet browsing habits, recent research has found…

It’s not too late to cash in on 2017’s IT trends

“Fad” is a dirty word for many small-business owners. Whether it’s what they’re selling or what they’re investing in, business…

What you need to know about VPNs

With stories of large-scale data breaches and internet service providers tracking internet habits, online privacy is becoming a rare commodity.…

Equifax’s Leak: lessons learned

No business owner wants their customers’ data leaked, but no matter how well your prevention plan is, the unexpected can…

Are all hackers out to do harm? Not so fast

Newspaper headlines and Hollywood movies have influenced our understanding of computer hackers, but in the real world it’s not so…

NSA to secure phones with virtualization

Corporate smartphones and tablets store a significant amount of valuable data. Combine that with their mobile nature and they’re particularly…

How did WannaCry spread so far?

By now, you must have heard of the WannaCry ransomware. It ranks as one of the most effective pieces of…

Warning: Do not install “Google Defender”

With as much as we write about sophisticated malware and security breaches, sometimes the most effective attacks are the ones…