Protecting the Secret Sauce: What You Need to Know About Intellectual Property (IP)

| | General Security
Intellectual property (IP) rights may apply to a multitude of things, from corporate branding names and new inventions to product designs and secret recipes. Do you have a secret sauce whether a... Go on to the site to read the full article ... Read More

Data Destruction for Everyday People

| | General Security
Do you have unnecessary sensitive documents laying around? How about old electronic devices that have your data stored on them, but which you no longer use? In this article, you’ll learn how to... Go on to the site to read the full article ... Read More
It’s Free: Security Doesn’t Have to Cost a Cent

It’s Free: Security Doesn’t Have to Cost a Cent

| | Security Awareness
Statistics suggest that between 43 percent and 70 percent of cyber-attacks are aimed at small businesses. The average cost to a small business in 2017 was $2,235,000. Up to 60 percent of small... Go on to the site to read the full article ... Read More

The Psychological Profile of a Hacker With Emphasis on Security Awareness

| | Security Awareness
The term “hacker” is a little vague. For instance, it is usually derogatory when actually there are “good” hackers too, ethical hackers whose job it is to find system and network vulnerabilities.... Go on to the site to read the full article ... Read More

Building a Security Awareness Program for Small Businesses

| | Security Awareness
InfoSec Institute is dedicated to increasing security awareness and has an enormous repository of information to help individuals, small- and mid-sized businesses and enterprises to increase their... Go on to the site to read the full article ... Read More

Top 10 Endpoint Security Trends in 2018

| | General Security
The Shodan search engine is an excellent resource for hackers looking for unprotected endpoints. If you have ever played with Shodan, you will probably know that some of the most popular searches are... Go on to the site to read the full article ... Read More

5 Steps to Mitigate Endpoint Security Incidents

| | Security Awareness
Endpoint security may be the best investment you have ever made. According to a Ponemon survey – The 2017 State of Endpoint Security Risk – the average cost to an organization of attacks... Go on to the site to read the full article ... Read More
Best Practices for Identifying Dangerous Emails

Best Practices for Identifying Dangerous Emails

| | Security Awareness
Disturbing Trends in Email Cyberattacks – the Statistics Symantec’s 2018 Internet Security Threat Report makes for disturbing reading about malicious email trends: The average user in the study by... Go on to the site to read the full article ... Read More

Why You Need a Cybersecurity Hero

| | Security Awareness
Robert Downey Jr. once said: “I think that we all do heroic things, but hero is not a noun, it’s a verb.” No, Mr. Downey, hero is a noun. However, the man makes an interesting point: in an... Go on to the site to read the full article ... Read More

How to Build a Network of Security Champions Within Your Organization

| | Security Awareness
Improving security awareness with specialized programs is essential for small businesses and large corporations alike, but is it enough? According to Joanna Huisman, research director at Gartner:... Go on to the site to read the full article ... Read More