Blog
 

More News

SIM
  |   News

SIM Swap Attacks are Trending

Imagine you haven't received any phone calls lately and consequently learn that your phone is out of commission. You stopped receiving text messages and phone calls. What would you think? Would you suspect that you are victim of a SIM Swap Attack? Perhaps shortly after,...

Read More
03 January
0
cybersecurity broken
  |   News

2018’s Major Breaches

Just like that, 2018 has come to an end. As we start to embrace the new year and our improved cybersecurity plans, let's recap some of the major breaches of 2018. Although we cannot change the past, understanding the vulnerabilities and major industries that took a...

Read More
27 December
0
top down culture
  |   News

Create a Top-Down Culture

The philosophy of creating a top-down security-minded culture at work makes perfect sense. How many times have you heard the saying "practice what you preach"? Often I think of parents and school teachers creating this type of top-down culture to be effective, but we really...

Read More
19 November
0
businessman connected worldwide
  |   News

The Evolution of the Hacker

If you're reading our blogs, chances are you will recall us emphasizing the fact that hackers have evolved through the years making it increasingly challenging to stay ahead of threats. Consider how much has changed since hacking began. You may recall a time when improvement/advancement...

Read More
15 November
0
polling place
  |   News

Hackers and the Upcoming Election

After the 2016 Presidential Election, many have concerns over voting security. This midterm election will reveal whether the Republicans will remain dominant over the legislative branch or if the Democrats will reign power. There's no doubt that people are passionate about their vote and that...

Read More
01 November
0