cybersecurity

Increase Your Law Firm Security by Using a Password Manager
Law offices are a target for hackers. Here’s how a password manager can boost your law firm’s security, keep your data safe, and make your employees’ lives easier.

Traveling Soon? Add These 5 Cybersecurity Essentials to Your Packing List.
With wider vaccine availability and country borders opening up, many of us are packing our bags. Here’s why you shouldn’t leave cybersecurity at home.

You Asked, A Hacker Answered: 7 Questions With Rachel Tobac
Social engineering expert and white-hat hacker Rachel Tobac tells us just how cautious we should be online.

Suiting Up for ISO 27001 Certification—Simplified
Infosec leader Naya Moss breaks down the key steps to prepare for a process that can be intimidating to many: ISO 27001 certification for your business.

Marketers, Here’s How—and Why—You Should Be Managing Your Team’s Passwords
Managing team passwords can be an overwhelming task. So how do you make logins simpler for you and your team and create secure business passwords?

From Maiden Names to School Mascots—The Best Ways to Use Security Questions
Security questions might not be the most effective method of securing access points, but you can learn tips and tricks for making the most of them.

Uncharted Digital Waters: How Private Are Telehealth Platforms?
Since the start of the pandemic, telehealth platforms have been more necessary than ever. But are they a target for cybercriminals?

3 Strategies to Prevent Breaches and Hacks at Work
Here are the three essential strategies for preventing data breaches and hacks, and other ways to enact damage control.

3 Key Steps to Building a Compliance Training Program
Guest contributor Naya Moss is an IT pro and infosec leader breaking down the basics of creating your own compliance training.

What’s Your Number? How to Avoid Port-Out Scams.
Hackers can use your cell phone number for a cyberattack known as a port-out scam. Here’s how they work and how you can protect yourself.