Learn more news
Archives for Category: Channel Top Resources
Ignore security at your own and your customers’ peril. Recently there was a post on r/sysadmin from a network administrator who had a client system hacked because he left their iLO card facing the internet… and didn’t stay up to date on vulnerabilities and patching. His lack of situational awareness led to what he initially viewed as a brief operational interruption, but has now come to und...
it, but your computer, mobile devices, accounts, and information all have value to cyber criminals. According to Verizon's 2017 Data Breach Report, 91% of company breaches start with an email. Knowing how to maintain email security at the user-level will keep you and your company safe. Here are the top 7 signs of a phishing email to watch out for:
It's not uncommon for the terms ‘Risk Assessment’ and ‘Penetration Test’ to be used interchangeably. The truth is, the two are very different. A risk assessment typically involves
- Identifying areas of vulnerability or potential weakness
- Providing a roadmap to a...