Our Blog

December 28, 2020

3 Positive Business Takeaways in 2020

Although 2020 has been filled with many unfortunate events like the coronavirus pandemic, there have been some positive business developments. Here are three of them.
December 23, 2020

5 Notorious Cyberattacks That People Will Remember Long After 2020 Ends

The number of cyberattacks has increased significantly in 2020. Here are five notorious cyberattacks that many people will remember for years to come.
December 21, 2020

The History and Rise of Emotet

By far, one of the most dangerous strands of malware to come along has been Emotet – a rogue program that was first discovered in 2014. […]
December 17, 2020

The IoT Cybersecurity Improvement Act: What It Is and What You Need to Know

Also commonly referred to as the IoT for short, the Internet of Things is a term that refers to a massive, interconnected network of literally billions […]
December 14, 2020

Microsoft Azure Cloud Service Hosts New Vulnerabilities

Two major flaws in Azure App Services were recently discovered involving Linux an open source and community-developed operating system.
December 10, 2020

The Backdoor Bill that could be Unsafe

Over the last few years, law enforcement agencies around the country have often battled with tech companies over the use of encryption on devices like smartphones […]
December 7, 2020

Software Vulnerabilities: Loved by Cybercriminals, Dreaded by Companies

Software vulnerabilities are common despite being are to find. Find out why hackers love discovering new ones and how companies can deal with the aftermath of […]
December 3, 2020

4 Reasons Why You Shouldn’t Click “Unsubscribe” Links in Emails

Using “Unsubscribe” links might seem like a good way to prevent junk emails from cluttering your inbox but doing so is risky. Here are four reasons […]
November 30, 2020

What You Need to Know about the MalLocker.B Mobile Ransomware

AndroidOS/MalLocker.B is the newest member of a ransomware family that has a long history of holding Android smartphones for ransom. Learn how MalLocker.B works and what […]