Show
Article
Article
Article How Phishing Works – and What You Can Do About It

June 3, 2019 – What is Phishing? Phishing is a particularly malicious type of cybercrime where attackers steal sensitive information from unsuspecting victims. What distinguishes phishing from other forms of…

Article
Article
Article Retail: Security Challenges

May 31, 2019 – Cybersecurity for retail companies needs to be a priority. Introduction Retailers are stores that resell consumer goods or services through different channels to gain a profit.…

Article
Article
Article Roving Users and Shared Workstations: Security Challenges

April 17, 2019 – What is a Shared Workstation? Shared workstations are corporate business trends that are commonly used in workplaces with staff that work during different shifts throughout the…

Article
Article
Article Government Security Compliance

April 8, 2019 – From 2015 to 2018, the United States Federal Government drastically reduced the number of estimated cyberattack incidents from 30,000 to only 125. How did they accomplish…

Article
Article
Article Financial Services: Security Challenges

March 15, 2019 – “It’s not a matter of if you will be breached, but just a matter of when.” – Gary Meshell Introduction Financial Services have been and are…

Article
Article
Article Education Security Challenges

March 8, 2019 – Introduction Why is higher education becoming one of the most popular targets for cyberattacks? Let’s take a look at the facts. High schools and Universities have…

Article
Article
Article What is SAML?

March 4, 2019 – Security Assertion Markup Language Security Assertion Markup Language, or SAML, is a way of simplifying confidential authentication for users between an identity provider (IDP) and service…

Article
Article
Article Manufacturing Security Challenges

February 20, 2019 – Introduction to the Manufacturing Industry The manufacturing industry refers to the industry sector that processes new products. Manufacturing involves the mass production of items that involve…