Blogs, Articles and Tips

What the White House Cybersecurity Chief's Departure Can Teach About Securing an Organization

October 29, 2019

Late last month, White House security Chief Dimitrios Vistakis resigned, citing “absurd” internal practices. While it’s no secret that the current administration has had a spotty relationship with cybersecurity, Vistakis’ resignation should be a wake-up call for the U.S. government. The good news is that even if it isn’t, it can be a wakeup call for you.


3 Ways a System Administrator Can Deal With Bad Users

October 24, 2019

Every administrator has at least one horror story from their time in the field. We’re the people who are responsible for keeping things running smoothly. That means that when something goes wrong, we’re the first on the chopping block. Here’s advice for managing that anger - along with some of the other baffling and aggravating tendencies of the end-user. 


Cybersecurity Professionals Are Overworked - How Can We Fix That?

September 30, 2019

As if the cybersecurity talent shortage isn’t an issue on its own, professionals already employed in the field are overworked - enough so that many have strongly considered quitting. It’s not surprising, given how constantly modern businesses are under threat by both criminals and internal staff. Here’s what to do about it.


Understanding the Five Types of Cybersecurity

September 26, 2019

Cybersecurity is about more than firewalls or antivirus tools. It’s about more than authentication or policies. Rather, it’s a multidisciplinary, multifaceted pursuit, a process by which you work to actively protect your organization’s people, systems, and data. With that in mind, there are five core disciplines on which you should focus. Read on to learn more about each.


How to Defend Your Business Against Phishing Scams

September 25, 2019

Phishing is one of the oldest and most widely-used cyberattack tactics for one reason: because it works. No matter how you harden your systems against intrusion, there’s always the chance that someone will open a malicious attachment. You can’t prevent that entirely, but you can mitigate it. Here’s how.


3 Reasons Why to Use Remote Workers and How to Do It

September 24, 2019

Telecommuting is the new normal.  Remote work is no longer just a nice perk that you can offer your employees - we’re fast approaching an era where it’s downright essential. And that’s not the only reason you should consider implementing policies and processes to enable remote employees, either.


The Real Challenge in Cybersecurity? Businesses Simply Don't Care

September 18, 2019

If you’re like most people, you’re probably tired of seeing the constant stream of data breaches and cyber-incidents in the media. You might blame the increasing capabilities of cyber-criminals. Ultimately, though, it can all be traced back to a single truth - as a whole, nobody cares enough about cybersecurity. How can we change that?


Deepfake Technology Demonstrates the Darker Side of Artificial Intelligence

August 07, 2019

Videos known as deepfakes have begun making the rounds online. Originally popularized as a pastime, deepfakes are a startling example of artificial intelligence gone too far. It’s now possible to create a convincing, startlingly-realistic video of someone saying or doing something they never would. And that’s terrifying.


How Bad Behavior on Social Media Can Ruin a Career

August 05, 2019

Don’t say or do anything on social media you wouldn’t say or do in public. Those are good words to live by - yet for some reason, people seem to completely neglect them. Unfortunately, that kind of thing can really come back to bite you, especially if you’re working for a tech company.