Cybersecurity

2023 Trends in Data Privacy That Could Impact Your Compliance

Free illustrations of Security

Data privacy has been a growing requirement ever since the internet age began. So much personal information is flying around through computer networks that protecting it has become a mandate. Most companies must follow HIPAA, GDPR, or another industry or locality-based privacy rule. By the end of 2024, 75% of the world’s population will have

2023 Trends in Data Privacy That Could Impact Your Compliance Read More »

Is Your Business Cybersecurity Strategy Focused on the Right Things?

To protect your home from an intruder you make sure the doors and windows are all locked and secured. You might even go further by building a fence around the yard, perhaps even having an angry-looking dog to stand guard. But there’s no point going to all that effort if someone’s already broken in and

Is Your Business Cybersecurity Strategy Focused on the Right Things? Read More »

Young Employees Have Different Attitudes Toward Cyber Crime

Legal gavel on laptop

If you employ anyone aged between 16 and 19, you need to pay special attention to the cyber security training you’re giving your team. A new study has revealed that a host of worrying online behavior has become almost normalized among many young people. And much of this activity is illegal. We’re not talking about

Young Employees Have Different Attitudes Toward Cyber Crime Read More »

What’s Changing in the Cybersecurity Insurance Market?

Free A Paper beside a Person Typing on a Laptop Stock Photo

Cybersecurity insurance is still a pretty new concept for many SMBs. It was initially introduced in the 1990s to provide coverage for large enterprises. It covered things like data processing errors and online media. Since that time, the policies for this type of liability coverage have changed. Today’s cyber insurance policies cover the typical costs

What’s Changing in the Cybersecurity Insurance Market? Read More »

Devious New Phishing Scam Targets E-Signature Clients

Docusign homepage

Another day, another scam. And this is a sneaky one. Cybercriminals are getting smarter. This recent malware threat is unusually smart. It impersonates a highly trusted brand name to get a foot in the door. Targets receive a convincing looking email that appears to come from a widely used e-signature platform. Attached to the email

Devious New Phishing Scam Targets E-Signature Clients Read More »

5 Ways to Balance User Productivity with Solid Authentication Protocols

Free photos of Cyber security

One constant struggle in offices is the balance between productivity and security. If you give users too much freedom in your network, risk increases. But add too many security gates, and productivity can dwindle. It’s a fine balance between the two, but one you can achieve. Organizations need to recognize the importance of both. And

5 Ways to Balance User Productivity with Solid Authentication Protocols Read More »