Ready for a trip to the dark side?

Ready for a trip to the dark side?

Join us for a behind-the-scenes tour of dark web marketplaces and see how the cybercrime economy really works. We’ll take you inside bustling dark web marketplaces and show you how the business of hacking is conducted – and how cybercriminals profit from their ill-gotten gains, like your data!

Sign up here.

Can malware affect your Mac?

Malware creators will target anyone and everyone, including Mac users. So even though Apple computers are less vulnerable than Windows PCs, they are not completely impervious to cyberattacks. Read on to find out the different threats you should protect your Mac against, as well as signs that your computer has been compromised. What are the […]

GRIT Technologies and Datto CISO Discuss Cyber Resiliency

In this past few years there has been a shift across the IT industry from Cybersecurity, over to Cyber Resiliency. The idea is to have the people, processes and procedures in place ahead of time, so you can quickly respond to a breach, when it happens.

Cybersecurity Awareness Month: Why You Should Follow The 3-2-1 Backup Rule

Backing up your data regularly is an overlooked step in personal online security. The top IT and security managers follow a simple rule called the 3-2-1 backup rule. Essentially, you will keep three copies of your data on two diverse types of media (local and external hard drive) and one copy in an off-site location (cloud storage). 

If you become a victim of ransomware or malware, the only way to restore your data is to erase your systems and restore with a recently performed backup.

Cybersecurity Awareness Month: Why Training Users On Phishing Is Important

 

Phishing scams are nastier than ever this year. In a phishing scheme attempt, the attacker poses as someone or something the recipient recognizes and attempts to trick the target into divulging credentials, clicking a malicious link, or opening an attachment that infects the user’s system with malware, trojan, or zero-day vulnerability exploit.

How to create a strong passphrase

It’s not controversial to state that good, secure passwords are hard to create and even harder to remember.

And there are few things more frustrating than having to create a new password because you forgot the old one or were forced to change it.

In our attempt to make passwords easier to remember, we start adopting bad password habits.

Ransomware: What You Should Do to Protect Your Business Against This Real and Persistent Threat. 

Last week, White House sent out a memo addressed to Corporate Executives and Business leaders titled What We Urge You to Do To Protect Against The Threat of Ransomware. 

You don’t have to be a news junkie to realize that ransomware incidents are on the rise.

Cybersecurity Effectiveness is Changing: Here is What You NEED to Know.

There is no question that business today is radically different than it was prior to 2020.  These changes over the last 18 months brought about new challenges in cybersecurity and how businesses need to think about keeping their network, and data, safe.

Cybersecurity terminology you need to know

Do IT security terms like “phishing” and “intrusion protection” sound extremely foreign to you? If so, it’s time you familiarize yourself with these and other common cybersecurity terms. By learning these basic concepts, you’ll be more aware of the depth and scope of online dangers and, hopefully, be better prepared to deal with them. Malware […]

Overcoming the Challenge of Cloud SecurityLearn more here
+