It’s not uncommon for companies to think that disaster recovery and business continuity plans are one and the same. Learn why both plans are needed. Tornados, […]
Researchers set up honeypots to learn how cybercriminals find and attack poorly protected Secure Shell (SSH)-enabled servers. Learn what the researchers found so you can protect […]
Passwords are an important line of defense against cyberattacks, yet many people make it easy for hackers to crack them. Here are six mistakes that people […]
Samsung is launching four models of its flagship smartphone, the Galaxy S10. Discover when these smartphones will be released and how they differ from each other. […]
Learn how to prepare for this update and how you can control when it reaches your company’s computers. On January 16, 2019, Microsoft finally started the […]
Google was fined $57 million for not complying with the General Data Protection Regulation. Learn why Google was penalized so you can avoid the same data-privacy […]
Compared to ransomware or data breaches, cryptojacking might seem like a minor annoyance. Learn how it is changing and what you can do to guard against […]