2 min read
Data Protection Law: complying with the GDPR
The General Data Protection Regulation (GDPR) is a comprehensive data protection law that came into effect on May 25, 2018. It applies to all...
2 min read
The General Data Protection Regulation (GDPR) is a comprehensive data protection law that came into effect on May 25, 2018. It applies to all...
2 min read
The demand for cyber insurance has skyrocketed in the last few years. The business, currently valued at $7.8 billion, is predicted to grow to $20...
2 min read
Small and medium sized businesses are struggling to understand and implement managed detection and response (MDR). Lack of security knowledge within...
2 min read
Consider yourself on a bicycle when a nasty bump unexpectedly comes and bursts your tire. Your day might be ruined, but if you have a repair kit and...
2 min read
Likely during work hours, you have gone through the cybersecurity awareness training modules provided by your employer. You might have hoped to pass...
3 min read
Small and medium-sized businesses are frequently targeted by Business Email Compromise (BEC) scams that attempt to deceive victims into sending...
3 min read
Ransomware is nothing new. But the tactics, techniques, and procedures leveraged by threat actors have reached new levels of sophistication over the...
3 min read
Vulnerability scanning and penetration testing are two very different ways to test your system for any vulnerabilities. Despite this, they are often...
1 min read
Passwords are a set of strings provided by users at the authentication prompts of web accounts. Although passwords remain one of the most secure...
2 min read
Recently, there has been an increase in cybercrime against financial services companies in New York. The New York Department of Financial Services...