Security

Generate certificates openssl secure servers

Secure your servers: generate self-signed certificates with OpenSSL

Learn how to create secure self-signed server and client certificates using OpenSSL with this comprehensive step-by-step tutorial. Ensure robust security for your server communications.

privileged-account-abuse-signs-to-watch-for

Privileged Account Abuse: Who’s Doing It, Signs to Watch For & How to Reduce the Risk

Users with privileged account access are given “the keys to the kingdom” — or at least the keys to valuable floors and rooms in the kingdom — so they can be more productive and efficient while carryin...

hackers-are-targeting-smb

[COVID-19] Hackers Are Targeting SMBs During the Pandemic & How to Fight Back

Before the world became gripped by the coronavirus pandemic, SMBs were already viewed as “ground zero” for cybercrime. Here are some alarming numbers: ,Two-thirds of SMBs have suffered a cyberattack...

What-Are-the-Benefits-of-Cloud-Visibility

What Are the Benefits and Challenges of Improving Cloud Visibility?

The cloud is nothing new in the world of technology and it has already become mainstream. Organizations of all sizes store their data in the cloud and use various cloud-based solutions for different p...

[UPDATE] 10 Password Management Best Practices

Technology isn’t the only thing that needs an update every once in a while. Password management best practices do as well, since the information security landscape — and unfortunately, the tactics and...

Why-Password-Reset-Is-Not-the-Most-Efficient

Why Account Brokering Is a Better Option than Resetting Passwords + How Devolutions Can Help

For several years, resetting passwords (a.k.a. account rotation) has been a standard best practice. For those outside the IT security world, this involves automatically generating a new password each ...

Hackers-Are-Targeting-Remote-Workers-During-the-Coronavirus-Pandemic

[COVID-19] 10 Tips to Stay Safe from Cyber Threats While Working from Home

In the past, remote workers — who were typically called teleworkers or telecommuters — were the rare exception, and the envy of folks who had to endure a miserable commute, or slog away from 9-5 in a ...

Top5-Strong-Cybersecurity-Policy-Beatrix-Potter

5 Elements of a Strong Cybersecurity Policy

For any company in the digital age, cybersecurity is an obvious area of concern. If your company holds any kind of sensitive or otherwise valuable information — such as identity documents, personal re...

5-Dangers-Leaving-Password-Management-Employees

5 Dangers of Leaving Password Management to Employees

Employees who can “manage themselves” are highly valued. After all, nobody wants to (or should want to) micro-manage every little thing an employee does. Micro-managing is not only tedious for everyon...

Prevent-Breaches-by-Negligent-Employees

How to Prevent Breaches Caused by Negligent Employees

Everyone knows that the cyber threat landscape is constantly getting worse. But what may come as a surprise is that the enemy isn’t just hackers who populate the dark web. It’s also negligent employee...

Problems-Setbacks-Cyber-Security-Training

The Main Problems and Setbacks of Cyber Security Training

As a business, you’re always at risk of a cyber security breach or attack. Your employees are a big part of assessing various levels of risk, so you need to make sure they’re properly equipped. A lot ...

Am_I_paranoid

Am I Paranoid About Online Security?

I normally don’t have much trouble choosing a New Year’s Resolution, but this year has been tough. I just couldn’t think of something really important that I wanted to commit to. Well, a few days ago,...

7-Privileged-Accounts-Organization-Secure-Monitor

7 Kinds of Privileged Accounts that Organizations Must Secure and Monitor

Organizations rely on privileged accounts to drive productivity and efficiency. Unfortunately, hackers also rely on vulnerable privileged accounts to breach networks, access critical systems, and stea...

Prevent file upload vulnerabilities hacking

Prevent file upload vulnerabilities: essential security practices

Learn how to prevent file upload vulnerabilities with our essential security practices. Protect your system from malicious uploads by following these best practices and advanced protection techniques.

9-Tips-Secured-Home-Wireless-Network

9 Tips to Make Your Home Wireless Network More Secure

In a recent article on cybersecurity tips that parents should teach their kids, we highlighted how, contrary to what many people believe, home wireless networks can be highly insecure. Unfortunately, ...

How-Maximize-Your-Data-Security-AWS

How to Maximize Your Data Security in Amazon Web Services

Amazon Web Services (AWS) provides a cloud platform for information storage and data processing to millions of clients around the world, including militaries and governments. It’s one of the most powe...

Teach-Your-Kids-Cybersecurity

Parents: Cybersecurity Tips to Teach Your Kids

October is Cybersecurity Awareness Month — but not just for adults. Kids also need to understand the basics of staying safe online for many reasons, including: ,Since most kids don’t have credit rep...

Biggest-Cybersecurity-Risks-is-Everyone

The Biggest Cybersecurity Risks Business Owners Are Hedging Against

You may think that only the big corporations need to take care of cybersecurity. Unfortunately, everyone is at risk when it comes to cyber threats. Here are some of the bigger threats you should prote...

7-Popular-Cybersecurity-Certifications

7 Popular Cybersecurity Certifications

If you’re thinking of entering or advancing your career in the cybersecurity field, then smart move — because your skills will continue to be very much in demand. The U.S. Bureau of Labor Statistics e...

What-and-Why-You-Need-EDR

What Is EDR and Why Do You Need It?

In today’s volatile technology landscape, threat actors use poorly-secured endpoints as a backdoor into the network. These attackers take advantage of the fact that most endpoints are operated and mai...