As you read this, a slew of nations and U.S. states are working on digital-privacy regulations that will have a huge impact on your business. What’s more, these regulators work independently of one another, which is to say that regulations implemented by one...
Long before antivirus software was a twinkle in an engineer’s eye, humans were employing various strategies to protect their valuables from the prying hands of strangers. A lord and lady in a castle might have relied on tall, slippery castle walls for protection. If...
In Passwords 101, we looked at what is likely your first line of defense against cyberattack: the humble password. There are a lot of fairly simple things you can do to make sure you have the best password possible. However we also noted that passwords are just the...
Like death and taxes, passwords are an inescapable part of our lives these days, both in and out of the office. Did you ever hear the joke about bad passwords? It goes, “I always have trouble remembering my password so I changed it to incorrect. That way, when I enter...
In our last post , we covered a few of the most basic terms that come up in conversations about information technology. But you’re not visiting this site just because you care about IT in general—you’re here because you care about cybersecurity. So let’s take our...