• 567 words2.8 min read

    What is the Log4j Flaw? There is a lot of vocabulary flying around lately involving something called Log4j. The Log4j vulnerability, Log4j zero-day flaw, Log4j scanners… What’s everyone talking about? For something to generate so much buzz in a year

  • 573 words2.9 min read

    New Phishing Trends in 2022 Ransomware is becoming an ever more popular form of attack. With incidences on the rise, people might wonder how attackers get at computers at all. There are various ways systems become compromised, but one of

  • 586 words2.9 min read

    What to Do if You’re in a Data Breach Data breaches are becoming more common. As we’ve mentioned, even high-profile websites have passwords and more leaked. In our always-on, always-connected world, we can feel very secure… But the truth is

  • 605 words3 min read

    How to Protect Yourself from Ransomware in 2022 Ransomware became a hot word this year. The attacks on Colonial Pipeline, JBS Foods, and others shined a light on the threat for many people. Unfortunately, ransomware has shown no signs of

  • 628 words3.1 min read

    Avoid Cryptocurrency Scams in 2022 The world of commerce is changing rapidly. Advancements in technology have given rise to entirely new markets, such as cryptocurrency. It’s no wonder why – This new form of trading and finance can generate massive

  • 575 words2.9 min read

    What Is Data Encryption? In the world of cyber security, there are few things as essential but invisible as data encryption. Data encryption takes data and scrambles it into a code called “ciphertext” or “cipherscript” according to one or many

  • 517 words2.6 min read

    Cybercrime Threats for 2022 As the new year approaches and technology continues to develop on both sides of the cyber intelligence industry, it must be understood that cybercrime is not slowing down. On the contrary, cybercrimes are some of the

  • 530 words2.7 min read

    Password Protection Tips for 2022 The new year is almost upon us, and soon after that, it’ll be World Password Day again. Intel put forward the day in 2013, and it is a reasonable time to keep our digital environment

  • 618 words3.1 min read

    Do I Need a Data Breach Plan? Data breaches are becoming facts of life. IT managers and business owners should face the reality that can be attacked. The question is about how often and through what means. The 2016 leak

  • 792 words4 min read

    The Internet is both an AWESOME and SCARY place.  It is like any other tool, proper training, and usage dictate success. Criminals use the Internet to broaden their reach, to increase the scope and number of victims, of traditional crimes