Subscribe to get all the news, info and tutorials you need to build better business apps and sites
We'll update you weekly with all the latest news and tips you need to develop and deploy today's business apps.
Posted on 04.27.20 by Michael O'Dwyer
Wire fraud is a federal offense under U.S. law and refers to fraud committed using electronic communications, such as telephone or computer. Unfortunately for financial institutions, wire fraud is on the increase, and not just in the U.S.
Posted on 04.22.20 by Andrew Sanders
Relative to the sensitivity of the data that they protect, law firms have some of the laxest information security that you can find.
Posted on 04.21.20 by Gwen Luscombe
Bursting with personal information and financial details for students and employees, as well as valuable research information that could result in financial loss if stolen, Universities are seen as having lax systems and an abundance of reward.
Posted on 04.21.20 by Neal O'Farrell
Zoom has seen hyper-growth during what IT teams are calling the "new normal." But that fame comes with a cost--the attention of hackers and security pros.
Posted on 04.14.20 by Greg Mooney
Jason Rader from Insight Enterprises discusses the challenges IT teams are facing during the pandemic, such as Shadow IT and data security issues.
Posted on 04.13.20 by Michael O'Dwyer
Online shoppers are often encouraged to ensure that their chosen online stores are 'secure', that the 's' in HTTPS is visible, and that the web browser displays a lock symbol. Propagating these visible indicators as confirmation of website security is not only...
Posted on 04.03.20 by Arun Vishwanath
The Dark Triad brings together three types of online cyber attacks: hacking, misinformation, and trolling. While they can each work independently, they usually feed off each other and become especially potent when working in concert.
Posted on 04.02.20 by Greg Mooney
With entire workforces and student bodies at all levels of education now logging in from home, deploying Single Sign-On and Multi-factor Authentication is as important as ever.
Posted on 03.27.20 by Adam Bertram
The Windows registry can be a goldmine for attackers and clueless employees. There’s no place better suited for introducing security vulnerabilities or completely screwing up a Windows system than the registry.
Posted on 03.24.20 by Michael O'Dwyer
Retaining openness and transparency while reducing cyber risk is the Holy Grail of educational IT and challenging to implement.
Click here for more information about the rights of California Residents under the California Consumer Privacy Act.