<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">

security

Posted on 04.13.20 by Michael O'Dwyer

HTTPS and A Padlock Does Not Mean A Website is Secure

Online shoppers are often encouraged to ensure that their chosen online stores are 'secure', that the 's' in HTTPS is visible, and that the web browser displays a lock symbol. Propagating these visible indicators as confirmation of website security is not only...

Posted on 04.03.20 by Arun Vishwanath

How Hacking, Trolling, and Misinformation Impacts Cybersecurity

The Dark Triad brings together three types of online cyber attacks: hacking, misinformation, and trolling. While they can each work independently, they usually feed off each other and become especially potent when working in concert.

Posted on 04.02.20 by Greg Mooney

Multi-factor Authentication and Single Sign-On for Remote Employees

With entire workforces and student bodies at all levels of education now logging in from home, deploying Single Sign-On and Multi-factor Authentication is as important as ever. 

Posted on 03.27.20 by Adam Bertram

How to Change Registry Permissions with PowerShell

The Windows registry can be a goldmine for attackers and clueless employees. There’s no place better suited for introducing security vulnerabilities or completely screwing up a Windows system than the registry.

Posted on 03.24.20 by Michael O'Dwyer

Balancing Data Security and Information Sharing in Higher Education

Retaining openness and transparency while reducing cyber risk is the Holy Grail of educational IT and challenging to implement.

Posted on 03.23.20 by Greg Mooney

What Is the Gramm-Leach-Bliley Act (GBLA)?

The Gramm-Leach-Bliley Act (GLBA) has been around since 1999, but it doesn't just affect financial services, it also requires higher education to comply.

Posted on 03.17.20 by Greg Mooney

The Cybersecurity Risks of Remote Employees Working From Home

The latest news and lockdowns around the world may seem drastic to some managers, but the reality is that working from home is the future for all office workers.

Posted on 03.12.20 by Greg Mooney

What Is FERPA and What Are the Necessary Security Controls?

The right to privacy for individuals impacts just about every industry, and education is no different.

Posted on 03.12.20 by Greg Mooney

Podcast: Managing eWaste in a Secure and Compliant Manner

Businesses must consider all the data security implications when dealing with eWaste. Many companies are now opting to shred old equipment on top of using tools to wipe storage devices.

Posted on 03.05.20 by Greg Mooney

Podcast: Why Cyber Hygiene Is So Important

In this podcast, Dr. Arun Vishwanath joined the podcast to discuss the theory of cyber hygiene, what it is, and why it needs to become part of everyone's vocabulary. 

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.