Cybersecurity Not a Priority for Majority of Employees When Traveling

11/16/18
Share: Facebook Twitter Google Email

Look around any airport and you will find thousands of workers tapping away on their laptop--usually on free public WiFi. New research says that a whopping 77% of workers tap into free public WiFi when traveling and some 63% access their work emails and files. The statistics are startling to...

Smart Manufacturing

Smart Manufacturing

11/15/18
Share: Facebook Twitter Google Email

The industrial internet of things promises to be pivotal to the next industrial revolution in manufacturing. How? By harnessing all the power that digital technology offers through artificial intelligence and advanced machine learning. Still very much in its infancy, IoT solutions are already...

CIO's priorities

CIO’s Priorities for 2019

11/14/18
Share: Facebook Twitter Google Email

Gartner's latest annual CIO Agenda survey of more than 3,000 CIOs in 98 countries found that 95 per cent of CIOs expect digitalization to change their jobs. IT delivery is seen as a given, with the two-key transformation in the role being change leadership and the assumption of greater and broader...

Guide to DaaS

11/13/18
Share: Facebook Twitter Google Email

What is device-as-a-service (DaaS)? From desktop computers and laptops to tablets and smartphones, equipping your business with all the devices you need to thrive in the digital era can be expensive. It’s also difficult to manage a fleet of company-owned devices – most of which require...

cons

I Know Your Secrets…And Other Cons

11/09/18
Share: Facebook Twitter Google Email

Maybe you've been one of the unfortunate folks who've received a scary email or even a letter in the mail trying to blackmail you into paying Bitcoin. Sadly, this con has gained quite a bit of traction, because let's be honest, many folks have their little secrets, and in the world of cons it's...

malware attack

Signs of a Malware Attack on Your Phone

11/06/18
Share: Facebook Twitter Google Email

When a virus hits your computer, it's usually pretty obvious. Strange pop-ups appear on your screen, your computer gets stuck, or it gets really slow and then crashes. But what about your smart phone? Are the signs of an attack quite so obvious? A malware attack on your phone might be much...

Offensive Security Engagements

Why SMB’s Need to Utilize Offensive Security Engagements

11/02/18
Share: Facebook Twitter Google Email

My name is Dave Collins and I am a security analyst here at ETGI / DarkHound Security. I’ve previously written about threat actors targeting the small to mid-size business (SMB) space here and now I want to expand on the concepts I covered in that article. Today I want to focus on offensive...

Tips to Avoid Ransomware

Tips to Avoid Ransomware

10/31/18
Share: Facebook Twitter Google Email

Combatting ransomware is always on the forefront of cyber news. This week an article by Joe Merces, the former CIO of the New York City Law Department (the world's largest public sector law firm) and now CEO for Cloud Daddy was published on the best practices for avoiding ransomware. Merces...

IoT

How to Securely Manage Your IoT Devices

10/30/18
Share: Facebook Twitter Google Email

Managing IoT devices is a lot like running a preschool after recess. The toys are all over the place and the kids are going crazy. So how do IT security professionals protect their business from cyber risk and still let the employees have access to all their connected devices? A good place to...

Cyber Security Best Practices

The Majority of Users Don’t Know Cyber Security Best Practices

10/19/18
Share: Facebook Twitter Google Email

Cyber Security Best Practices: According to KnowBe4 and new data from MediaPRO’s third annual State of Privacy and Security Awareness Report, users are less prepared this year to address the risk of cyberthreat. With the threat of cyber attacks increasing, organizations would like to think...