A Cybersecurity Concept Illustration; A Key Formed from Binary C

Guest Post: Last Mile Communications: Ownership and Security with Lochbox

Last Mile Communications: Ownership and Security with Lochbox INTRODUCTION In 2017, the US Department of Homeland Security issued a security report (DHS, 2017, p. 53) strongly discouraging the use of provably-open mobile calls and SMS text messages while declaring the use of landlines as no more secure. Convenience and complacency are the two main factors […]

Air Gap Solutions

Managing Air-Gapped Backups By James Speed | Perpetual Storage, Inc. Sales Manager Air-gapped technologies often rank among the most affordable and effective backup solutions available to organizations. Using air-gapped storage solutions can introduce some challenges and organizations need to identify and use backup solutions that secure user logins and can manage different air-gapped technologies. 5 […]

Questions about cyber security

Guest Post: Train, Secure and Empower Employees

Drip7 is the New Way to Train By Heather Stratford | Founder and CEO of Drip7 Inc. The news is full of cybersecurity incidents that emphasize how prevalent attacks on businesses have become. According to Check Point Research, corporate networks had a 50 percent increase in cyber-attacks from 2020 to 2021 globally. The Log4J vulnerability […]

Big data and cybersecurity 3D illustration. Global database intelligence

Guest Post: Take The Power Back From Hackers

How To Keep Control Of Your Data, And Avoid Becoming A Cybercrime Victim by Earl Foote – CEO/Founder | Nexus IT Consultants   2020 was a banner year for cybercriminals. The number of phishing emails and social engineering scams that use the COVID-19 pandemic as a topic represents the single largest thematic series of cybercrime attacks […]