Subscribe to get all the news, info and tutorials you need to build better business apps and sites
We'll update you weekly with all the latest news and tips you need to develop and deploy today's business apps.
Relative to the sensitivity of the data that they protect, law firms have some of the laxest information security that you can find.
Bursting with personal information and financial details for students and employees, as well as valuable research information that could result in financial loss if stolen, Universities are seen as having lax systems and an abundance of reward.
Zoom has seen hyper-growth during what IT teams are calling the "new normal." But that fame comes with a cost--the attention of hackers and security pros.
Jason Rader from Insight Enterprises discusses the challenges IT teams are facing during the pandemic, such as Shadow IT and data security issues.
Online shoppers are often encouraged to ensure that their chosen online stores are 'secure', that the 's' in HTTPS is visible, and that the web browser displays a lock symbol. Propagating these visible indicators as confirmation of website security is not only...
The Dark Triad brings together three types of online cyber attacks: hacking, misinformation, and trolling. While they can each work independently, they usually feed off each other and become especially potent when working in concert.
With entire workforces and student bodies at all levels of education now logging in from home, deploying Single Sign-On and Multi-factor Authentication is as important as ever.
The Windows registry can be a goldmine for attackers and clueless employees. There’s no place better suited for introducing security vulnerabilities or completely screwing up a Windows system than the registry.
Retaining openness and transparency while reducing cyber risk is the Holy Grail of educational IT and challenging to implement.