
Dark Data: Why is it Important?
Data you find on the Internet is without a doubt vast and extensive,…

Ransomware - should you pay or not?
You may have seen the recent news about cities and towns being…

How Companies Can Protect Themselves from Ransomware
I was recently asked about ransomware and how companies can…

Protecting the Critical Infrastructure from cyber warfare
by Joe Clapp, senior consultant, SystemExperts for SC Magazine,…

DNS: Don’t ignore the risk to your company
by Sam Greengard, writer, Security Roundtable, February 19, 2019
It’s…

Three Security Predictions for 2019
I was recently asked my thoughts about cyber security trends…

Guideline for Reporting a Cyber Incident
In our last blog post, we covered the best practices for creating…

Three Best Practices for Creating and Implementing an Incident Response Plan
A cyber incident can have serious consequences. When a potential…

'Tis the Season to Protect Your Identity: Online Shopping Security
by Alayna Pehrson, content management specialist for Best Company,…