ransomware eye looks at viewer concept.

Six Ways to Spot a Fake Ransomware Demand

Undoubtedly, one of the most pernicious of the current crop of cybercrimes is ransomware.  Unlike many stealth-based approaches to profiting off system intrusion,...

word cloud: data breach, hacker, technology, security, privacy, network, theft, etc.

Damage Control: Communicating with and Protecting Victims after a Cyber Attack

“I’ve been hacked. Now what do I do?” Unfortunately, this is a question that too many small business owners and executives...

Corporate security manager identifies a potential insider threat in a line-up of eight white collar workers. Hacker or spy icon lights up purple. Cyber security and human resources challenge concept.

Your Biggest Security Threat Might be Right Under Your Nose

When an organization is hacked, fingers immediately point to the actors who planted the malware and have something to gain from...

encryption word cloud

What is Encryption? The Technology that Keeps Your Business Data Safe

Cybersecurity is an increasingly important consideration for businesses of all sizes. With strings of high-profile hacks on companies including Home Depot,...