by Arielle Miller | Aug 5, 2022 | Blog Posts
One in four mobile applications contains at least one high-risk security flaw. (Via NowSecure) Smartphones, since their rise to popularity in the late 90s and early 2000s, have become a large part of our society’s everyday life in hosting our...
by Samantha Parker | Aug 3, 2022 | Blog Posts
The numbers are in for July 2022– and let’s just say you’ll want to keep reading. As reported by Kon Briefing, cyber-attacks have affected more than 23 countries worldwide, with an estimated 54 breaches reported this past month. Below, we’ve...
by Arielle Miller | Jul 26, 2022 | Blog Posts
The biggest threat to cloud computing is poor identity, access, and credential management. While this has always been a threat to security, workplace changes brought on by the COVID-19 pandemic have made these threats more apparent. As remote and hybrid work...
by Peter Burg | Jul 18, 2022 | Blog Posts
Current State of Ransomware Attacks on Energy The increased dependence on digital communication, automation, and technology within major industries has posed a higher risk for cyber threats to vital industries, particularly the energy sector. With gas and oil...
by Samantha Parker | Jul 11, 2022 | Blog Posts
The popular consensus that Chromebooks and ChromeOS are superior in security among other devices and operating systems can be a dangerous belief that leads to complacency and negligence in implementing proper security measures. Chromebooks may have fewer security...
by Samantha Parker | Jul 8, 2022 | Blog Posts
June 2022 proved to be a trying time for organizations to keep their data safe from cyber criminals, as over 80 security incidents and 34.9 million records were breached, as reported by IT Governance. In particular, it seems the healthcare and finance sectors...