BYOD and Mobile: Cybersecurity in the New Decade
Just as we stepped into this decade, we were faced with changes in the workplace. We were practically forced to interact with technology both at home and at work. We have become more dependent on ou…

Just as we stepped into this decade, we were faced with changes in the workplace. We were practically forced to interact with technology both at home and at work. We have become more dependent on ou…
Here’s the thing; technology is evolving at whirlwind speeds. What is in today is out tomorrow. It is crucial for technical talent to keep their eye on the ball or be left behind in the debris. Hir…
Artificial intelligence has reached buzzword status. It might sound like something from the future but in reality, artificial intelligence and machine learning are a part of most of today’s businesses…
Cloud computing has become very popular over the past 10 years. The downside to this surge in cloud computing is that cloud computing security’s popularity pales compared to the number of people who u…
What does a Computer System Administrator do? A Computer System Administrator is responsible for the day-to-day operation of the organization's computer network. This may include dealing with any malf…
Ransomware attacks have been on the rise recently, especially in the public sector such as schools, local municipalities, and hospitals. Cybercriminals adapt faster to changing security and target the…
Tokenization is can be described as the process of replacing sensitive data with a token - usually a sequence of letters and/or numbers. Since there is no key to decode the data, there is no need for …
Phishing attacks are something most of us are already familiar with - someone emails you and pretends to be someone you know, trying to persuade you to give them your personal or sensitive information…
When a cyber-attack happens, every second is important. That is why EDR, or Endpoint Detection and Response, tools are key to minimize the impact of the attack. They enable a fast reaction that can ke…
Is your team ready for the next cyber-crisis? You might have been pre-COVID 19, but are you prepared now? Since most companies now have employees that work from home (WFH), they are more vulnerable …