. . Shut down the system: By shutting down your company system, you’re preventing further damage. You can move to an isolated network and then turn it off. This is the first thing you must do, because, if you’re running e-commerce or a bank platform, shutting down will...

  We all have a love-hate relationship with technology, and when it comes to passwords in most cases we hate them. We have so many passwords, there is a new one for everything, we have to change them once they expire, and some sites have a...

Credential stuffing is a strategy where hackers will collect a set of usernames and passwords from a corporate breach and then try and stuff those usernames and passwords into several other digital media platforms. Hackers make use of the fact that most users have the...

Marriott Hotels Was Recently Hacked This past week Marriott Hotels reported a massive data breach; some 500 million guest reservations had been stolen from its Starwood database. The company now faces a class-action suit and shares have subsequently fallen 5.6%. On top of this, Marriott says for about 327 million victims, compromised data may include names, addresses and...

Cyber Safety Is Often The Last Thing On Your Mind Over The Holidays With holiday season just a few short weeks away, it’s likely that you will be spending more time online searching for the perfect gifts to buy your loved ones. The vast majority of...

It's National Computer Security Day  November 30th is National Computer Security Day! Did you know that the first Computer Security Day was held in 1988 and was started by the Association for Computer Security to raise awareness concerning computer security issues? It’s been a long time...