FBI warns food and agriculture to brace for seasonal ransomware attacks
For the second time, the FBI has warned the food and agriculture sector about the risk of ransomware attacks.
Four key cybersecurity practices during geopolitical upheaval
In a time of rapid-changing crisis, here are four SMB cybersecurity best practices to help prevent the most common attacks.
Microsoft: Slow MFA adoption presents “dangerous mismatch” in security
Microsoft says its corporate users are not using MFA, another layer of security that keeps accounts safe. Unfortunately, this is not an isolated problem.
Internet safety tips for kids and teens: A comprehensive guide for the modern parent
There are certain things your kids should never grow out of. And two of these are following great cybersecurity and privacy practices.
“I have full control of your device”: Sextortion scam rears its ugly head in time for 2021
It’s the new year, and a fresh Bitcoin sextortion scam email has been making rounds.
10 best practices for MSPs to secure their clients and themselves from ransomware
For MSPs, securing themselves from ransomware is just as much a practice in securing clients. See how to save data—and money—with these best practices.
A week in security (October 7 – 13)
A look at the cybersecurity news from October 7 – 13, including updates on war shipping, managed service providers, and stalkerware.
5 simple steps to securing your remote employees
Modern businesses require modern cybersecurity, and modern cybersecurity means more than just implementing the latest tech. It also means implementing good governance.
Is two-factor authentication (2FA) as secure as it seems?
Two factor authentication (2fa) was introduced to enhance login security, but does it always work as advertised? Or can it be bypassed?
The many faces of omnichannel fraud
There’s a new kind of fraud out there, and it’s after organizations that have embraced omnichannel, a strategy that focuses on improved user experience. We take a look at what omnichannel is, the kinds of fraud that can affect businesses using this approach, and how they can protect themselves—and their clients.