Protecting the Secret Sauce: What You Need to Know About Intellectual Property (IP)
Intellectual property (IP) rights may apply to a multitude of things, from corporate branding names and new inventions to product designs and secret recipes. Do you have a secret sauce whether a... Go on to the site to read the full article ... Read More
Data Destruction for Everyday People
Do you have unnecessary sensitive documents laying around? How about old electronic devices that have your data stored on them, but which you no longer use? In this article, you’ll learn how to... Go on to the site to read the full article ... Read More
It’s Free: Security Doesn’t Have to Cost a Cent
Statistics suggest that between 43 percent and 70 percent of cyber-attacks are aimed at small businesses. The average cost to a small business in 2017 was $2,235,000. Up to 60 percent of small... Go on to the site to read the full article ... Read More
The Psychological Profile of a Hacker With Emphasis on Security Awareness
The term “hacker” is a little vague. For instance, it is usually derogatory when actually there are “good” hackers too, ethical hackers whose job it is to find system and network vulnerabilities.... Go on to the site to read the full article ... Read More
Building a Security Awareness Program for Small Businesses
InfoSec Institute is dedicated to increasing security awareness and has an enormous repository of information to help individuals, small- and mid-sized businesses and enterprises to increase their... Go on to the site to read the full article ... Read More
Top 10 Endpoint Security Trends in 2018
The Shodan search engine is an excellent resource for hackers looking for unprotected endpoints. If you have ever played with Shodan, you will probably know that some of the most popular searches are... Go on to the site to read the full article ... Read More
5 Steps to Mitigate Endpoint Security Incidents
Endpoint security may be the best investment you have ever made. According to a Ponemon survey – The 2017 State of Endpoint Security Risk – the average cost to an organization of attacks... Go on to the site to read the full article ... Read More
Best Practices for Identifying Dangerous Emails
Disturbing Trends in Email Cyberattacks – the Statistics Symantec’s 2018 Internet Security Threat Report makes for disturbing reading about malicious email trends: The average user in the study by... Go on to the site to read the full article ... Read More
Why You Need a Cybersecurity Hero
Robert Downey Jr. once said: “I think that we all do heroic things, but hero is not a noun, it’s a verb.” No, Mr. Downey, hero is a noun. However, the man makes an interesting point: in an... Go on to the site to read the full article ... Read More
How to Build a Network of Security Champions Within Your Organization
Improving security awareness with specialized programs is essential for small businesses and large corporations alike, but is it enough? According to Joanna Huisman, research director at Gartner:... Go on to the site to read the full article ... Read More