Security 5 Dangers of Leaving Password Management to Employees Employees who can “manage themselves” are highly valued. After all, nobody wants to (or should want to) micro-manage every little thing an employee does. Micro-managing is not only tedious for everyon... Derick St-Hilaire February 11, 2020
Security How to Prevent Breaches Caused by Negligent Employees Everyone knows that the cyber threat landscape is constantly getting worse. But what may come as a surprise is that the enemy isn’t just hackers who populate the dark web. It’s also negligent employee... Derick St-Hilaire February 6, 2020
Security The Main Problems and Setbacks of Cyber Security Training As a business, you’re always at risk of a cyber security breach or attack. Your employees are a big part of assessing various levels of risk, so you need to make sure they’re properly equipped. A lot ... Michael Dehoyos January 23, 2020
Security Am I Paranoid About Online Security? I normally don’t have much trouble choosing a New Year’s Resolution, but this year has been tough. I just couldn’t think of something really important that I wanted to commit to. Well, a few days ago,... Derick St-Hilaire January 15, 2020
Security 7 Kinds of Privileged Accounts that Organizations Must Secure and Monitor Organizations rely on privileged accounts to drive productivity and efficiency. Unfortunately, hackers also rely on vulnerable privileged accounts to breach networks, access critical systems, and stea... Derick St-Hilaire January 2, 2020
Security Prevent file upload vulnerabilities: essential security practices Learn how to prevent file upload vulnerabilities with our essential security practices. Protect your system from malicious uploads by following these best practices and advanced protection techniques. Gilad David Maayan December 19, 2019
Security 9 Tips to Make Your Home Wireless Network More Secure In a recent article on cybersecurity tips that parents should teach their kids, we highlighted how, contrary to what many people believe, home wireless networks can be highly insecure. Unfortunately, ... Laurence Cadieux December 10, 2019
Security How to Maximize Your Data Security in Amazon Web Services Amazon Web Services (AWS) provides a cloud platform for information storage and data processing to millions of clients around the world, including militaries and governments. It’s one of the most powe... Gilad David Maayan November 13, 2019
Security Parents: Cybersecurity Tips to Teach Your Kids October is Cybersecurity Awareness Month — but not just for adults. Kids also need to understand the basics of staying safe online for many reasons, including: ,Since most kids don’t have credit rep... Laurence Cadieux October 22, 2019
Security The Biggest Cybersecurity Risks Business Owners Are Hedging Against You may think that only the big corporations need to take care of cybersecurity. Unfortunately, everyone is at risk when it comes to cyber threats. Here are some of the bigger threats you should prote... James Riddle October 17, 2019
Security 7 Popular Cybersecurity Certifications If you’re thinking of entering or advancing your career in the cybersecurity field, then smart move — because your skills will continue to be very much in demand. The U.S. Bureau of Labor Statistics e... Derick St-Hilaire October 9, 2019
Security What Is EDR and Why Do You Need It? In today’s volatile technology landscape, threat actors use poorly-secured endpoints as a backdoor into the network. These attackers take advantage of the fact that most endpoints are operated and mai... Limor Wainstein August 28, 2019
Security Top 3 Information Security Risks to Know About in 2019 Information Security (InfoSec) is the only thing that stands between your information and data catastrophes. Most attacks nowadays target data due to the increasing importance it has on the survival o... Limor Wainstein August 27, 2019
Security 10 Tips to Keep Remote Workers Safe from Cyber Threats In the past, remote workers — who were typically called teleworkers or telecommuters — were the rare exception, and the envy of folks who had to endure a miserable commute, or slog away from 9-5 in a ... Joey Dupont August 20, 2019
Security Malware Basics: What You Need to Know Before you can protect your devices and organization against malware attacks, you need to know what you're fighting against – and I’m sorry to say, but it's really scary. It kind of makes the Night Ki... Jenny Knafo August 15, 2019
Security What's the Role of HR in Cybersecurity and Why Is It Important? You may think that cybersecurity is something big companies have to invest in. While that’s partly true, you may also have to think about cybersecurity. Ransomware like Petya can cost a company tens o... James Riddle July 31, 2019
Security Robust IT Security Comes to the Cloud For several years, the business argument to elevate platforms, apps and data to the public cloud has been characterized by the “Yes, it’s a great idea, but what about security?” narrative. Let’s start... Joey Dupont July 17, 2019
Security The Threat Stalkerware Poses to Your Business Learn how installing spyware presents a massive security risk that extends far beyond a privacy nightmare – and how to protect yourself and your business. A jealous spouse reads his wife’s text messag... Brad Litwin June 19, 2019
Security Big Challenges Facing CIOs and IT Leaders in 2019 Over the past 3 decades, we’ve watched information technology radically transform the workplace. It has changed how we view business processes and given us an appreciation of the far-reaching efficien... Wendy Dessler June 18, 2019
Security SQL Server with Integrated Security – That's So 2015... During the early stages of Remote Desktop Manager’s development, focus was set on click-next-to-continue deployment and ease of use. We can all agree that the IT field has changed drastically these pa... Maurice Côté June 13, 2019