Archive for 'Articles' Category
“Deep Fake” Technology is Behind The New Trend of AI-Assisted Fraud… An article review. It’s a scenario that probably happens far more often than we’d like to admit: an employee gets a phone call from a superior requesting they perform some task that is out of the ordinary. There are policies in place requiring more […]
Four out of five schools have experienced a cybersecurity incident… An article review. While it seems like these days every organization faces cybersecurity threats, as we’ve pointed out in the past schools are an increasingly attractive target to hackers—and a new audit carried out by the cybersecurity wing of the UK’s Government Communications Headquarters (GCHQ) […]
These tools will help you assess and improve your cybersecurity preparedness… An article review. If you’re a regular reader of our blog, you know that we think cybersecurity training and the tools that go along with it are vitally important to any organization that relies upon computers—which is pretty much everyone, now. The Federal Financial […]
Nearly 50 vulnerabilities were found in printers from the top six brands… An article review. You’re aware of phishing scams, you don’t open e-mail attachments you weren’t expecting to receive, your virus definitions are updated regularly and you don’t connect to unsecured wifi networks…but when was the last time you thought about your printer? A […]
A lack of funding and IT staff makes for an inviting target… An article review. While it seems like everyone from individuals to major corporations are targeted by hackers these days, one group has been targeted with increasing frequency—and success: school districts. That’s according to a recent article in The New York Times, which notes […]
There is no excerpt because this is a protected post.
In a change for the Agency, the new directorate will have a defensive focus… An article review. Over the last few years, we’ve seen a cat and mouse game between hackers and the good guys: from potential foreign influence in elections to the establishment of the US “Cyber Command” and, of course, the steady announcement […]