online security
5 Ways to Protect Online Learning Environments
As most schools continue to provide online learning during COVID-19, here are some ways to keep students and systems protected Remote work has become a way of life for many office and ...
Fighting Fraud in a COVID-Induced Digital Reality
As online platforms become even more popular during COVID-19, fraud is steadily increasing. Here’s what you need to know The COVID-19 pandemic has had a tremendous impact on how people around the ...
It could happen to anyone…
The headline is eye catching: a data breach at a highly respected security training organization when an employee falls for a phishing email. It is ...
66 Percent of Consumers Recycle Their Account Passwords. Do You?
As the world becomes more digitally bound and workers adapt to new business models, our cyber habits should improve considerably. Unfortunately, this hasn’t been the case. The 2020 LastPass ‘Psychology of Passwords’ ...
EmailRep – Squeezing actionable info from malicious email addresses
Yes, I know it has been quite a while since I have posted anything to the old blog, but I do have an excuse… in ...
Email security: Is it any good against hackers?
World’s first in-depth, public test of security services vs. targeted attacks. This email security test report is the product of two years of advanced threat research. We have worked with the security ...
Shared Responsibility in Data Security
We need to reassess how we define data security and where we place responsibility in protecting our data online. Over the past decade, consumers have enjoyed increasingly convenient, often free services in ...
Securing the real perimeter – part 2
In my last post, I went on about how the real perimeter of your network is at your users’ workstations. The actions that humans take ...
Securing the real perimeter – part 1
I was thinking about the way that the concept of a “perimeter” has changed in the time I have been in information security. (Obviously, I ...
Cybersecurity at Banks a Different Kind of Holiday Stress
Regardless of how they are made or who may be at fault when fraudulent transactions occur, the buck stops at the desks of cybersecurity professionals working at banks and financial institutions. A ...

