Learn how to create secure self-signed server and client certificates using OpenSSL with this comprehensive step-by-step tutorial. Ensure robust security for your server communications.
Users with privileged account access are given “the keys to the kingdom” — or at least the keys to valuable floors and rooms in the kingdom — so they can be more productive and efficient while carryin...
Before the world became gripped by the coronavirus pandemic, SMBs were already viewed as “ground zero” for cybercrime. Here are some alarming numbers: ,Two-thirds of SMBs have suffered a cyberattack...
The cloud is nothing new in the world of technology and it has already become mainstream. Organizations of all sizes store their data in the cloud and use various cloud-based solutions for different p...
Technology isn’t the only thing that needs an update every once in a while. Password management best practices do as well, since the information security landscape — and unfortunately, the tactics and...
For several years, resetting passwords (a.k.a. account rotation) has been a standard best practice. For those outside the IT security world, this involves automatically generating a new password each ...
In the past, remote workers — who were typically called teleworkers or telecommuters — were the rare exception, and the envy of folks who had to endure a miserable commute, or slog away from 9-5 in a ...
For any company in the digital age, cybersecurity is an obvious area of concern. If your company holds any kind of sensitive or otherwise valuable information — such as identity documents, personal re...
Employees who can “manage themselves” are highly valued. After all, nobody wants to (or should want to) micro-manage every little thing an employee does. Micro-managing is not only tedious for everyon...
Everyone knows that the cyber threat landscape is constantly getting worse. But what may come as a surprise is that the enemy isn’t just hackers who populate the dark web. It’s also negligent employee...
As a business, you’re always at risk of a cyber security breach or attack. Your employees are a big part of assessing various levels of risk, so you need to make sure they’re properly equipped. A lot ...
I normally don’t have much trouble choosing a New Year’s Resolution, but this year has been tough. I just couldn’t think of something really important that I wanted to commit to. Well, a few days ago,...
Organizations rely on privileged accounts to drive productivity and efficiency. Unfortunately, hackers also rely on vulnerable privileged accounts to breach networks, access critical systems, and stea...
Learn how to prevent file upload vulnerabilities with our essential security practices. Protect your system from malicious uploads by following these best practices and advanced protection techniques.
In a recent article on cybersecurity tips that parents should teach their kids, we highlighted how, contrary to what many people believe, home wireless networks can be highly insecure. Unfortunately, ...
Amazon Web Services (AWS) provides a cloud platform for information storage and data processing to millions of clients around the world, including militaries and governments. It’s one of the most powe...
October is Cybersecurity Awareness Month — but not just for adults. Kids also need to understand the basics of staying safe online for many reasons, including: ,Since most kids don’t have credit rep...
You may think that only the big corporations need to take care of cybersecurity. Unfortunately, everyone is at risk when it comes to cyber threats. Here are some of the bigger threats you should prote...
If you’re thinking of entering or advancing your career in the cybersecurity field, then smart move — because your skills will continue to be very much in demand. The U.S. Bureau of Labor Statistics e...
In today’s volatile technology landscape, threat actors use poorly-secured endpoints as a backdoor into the network. These attackers take advantage of the fact that most endpoints are operated and mai...