Insights
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy.
Zero-Day Attacks Explained
Zero-day attacks… an almost-menacing, militant-sounding term. Zero-day attacks (or zero-day exploits) are actually cyberattacks that take advantage of previously-unknown vulnerabilities in software. Zero-days are called so because the vulnerabilities are exploited...
Insider Threats
The Russian cyber attack on the 2016 Presidential Election has brought cybersecurity to the forefront. Regardless of which industry you’re in, that attack made it abundantly clear we’re all at risk of cyber breaches. But don’t kid yourself – it isn’t just foreign...
Cybersecurity and Our Critical Infrastructure
The nation’s infrastructure is vulnerable to cyberattacks. We know this because a successful, prolonged (the attacks began as early as March 2016) cyberattack was discovered this year. In March 2018, the United States Department of Homeland Security (DHS) and the...
National Cybersecurity Awareness Month
If you own an internet-connected device and like to surf the web, awareness of how you can protect yourself from cyber-attacks should already be a paramount issue. However, if you have not been the victim of a hack or a phishing expedition, you may think cybersecurity...
Phishing Explained: Don’t Get Hooked
If you have an email account, it’s likely you’ve experienced a phishing attack. Simply put, a phishing attack is when a person with nefarious intent sends you an email that appears to be from a company or person you know. The text of the email often warns that there...
Advanced Persistent Threats – What Are They?
There are different levels of threat concerning cybersecurity. Sophisticated, prolonged attacks (usually carried out by a nation-state, organized criminal element, rival corporations with the intent of spying on your business, or terrorists) are referred to as...