Dark Data: Why is it Important?

Data you find on the Internet is without a doubt vast and extensive,…

Ransomware - should you pay or not?

You may have seen the recent news about cities and towns being…

How Companies Can Protect Themselves from Ransomware

I was recently asked about ransomware and how companies can…

Protecting the Critical Infrastructure from cyber warfare

by Joe Clapp, senior consultant, SystemExperts for SC Magazine,…

DNS: Don’t ignore the risk to your company

by Sam Greengard, writer, Security Roundtable, February 19, 2019 It’s…

Three Security Predictions for 2019

I was recently asked my thoughts about cyber security trends…

Guideline for Reporting a Cyber Incident

In our last blog post, we covered the best practices for creating…

Three Best Practices for Creating and Implementing an Incident Response Plan

A cyber incident can have serious consequences. When a potential…

'Tis the Season to Protect Your Identity: Online Shopping Security

by Alayna Pehrson, content management specialist for Best Company,…