(Image courtesy Trend Micro)
by Maria Catricala and Dave Millier, on Sep 21, 2022 10:46:41 AM
by Maria Catricala, on Sep 19, 2022 12:05:55 PM
by Dave Millier, on Sep 16, 2022 11:32:56 AM
(This is a summary of an article written for TLOMA Today: 5 Things Your Law Firm Can do Right Now to Improve Cybersecurity)
by Maria Catricala, on Sep 14, 2022 1:24:35 PM
by Maria Catricala and Dave Millier, on Sep 12, 2022 10:53:39 AM
Defence-in-depth is what cybersecurity experts refer to as a complete strategy of securing your network environment. It involves detecting threats and protecting network endpoints. The question does arise, do you need a defence-in-depth strategy? Can a business rely on detection versus protection?
by Maria Catricala, on Sep 9, 2022 12:01:21 PM
If you believe your company is too small to be targeted by cybercriminals, think again. Due to their lack of substantial cyber security budgets, small businesses are often viewed by hackers as “low hanging fruit,” or easy targets. Statistics confirm this as well.
by Maria Catricala and Dave Millier, on Sep 7, 2022 1:15:10 PM
Malware is defined as software that has malicious intent. Malware can delete files, change your browser path, or create what’s known as a C&C (Command & Control) connection to an external server, allowing a hacker to connect directly to your PC without you knowing. Yes, you should worry about malware, as it can cause you all kinds of headaches, such as running silently and hidden in the background and stealing your credentials when you log in.
by Maria Catricala, on Sep 2, 2022 12:18:34 PM
by Maria Catricala, on Aug 31, 2022 1:34:55 PM
Your company's network and data are accessible via endpoints. Desktops, laptops, smartphones, tablets, servers, workstations, and even Internet-of-things (IoT) devices are examples of endpoints. Securing those endpoints is important as a lot of data ends up going through those endpoints.
by Maria Catricala, on Aug 29, 2022 10:56:31 AM
Get the latest information and cyber security news here!