The need for solid data security practices is greater than ever, particularly as the costs of lax cyberhygiene grows. Though it may not seem like much on the surface, all it takes for a cybercriminal to take over your network and compromise your company’s data is for one employee to use a weak password or […]
There was a time when computer hacking was all about pushing boundaries, with hardware and software engineers (formally or informally educated) tinkering with machines and programs to create something new. While there are still plenty of hacker collectives and maker spaces floating around (not to mention white hats), the hacking landscape has fundamentally changed. Poor […]
Air travel is a staple of modern life, as evidenced by the record number of passengers that Transportation Security Administration (TSA) officers screened in 2018: 813.8 million! That’s an incredible number that shakes out to over 2 million screenings per day. As you can imagine, with more people taking to the air, the more likely […]
Hackers wear all varieties of hats. The best known are black hat hackers, who are out to sow cyber-discord in search of profit; and white hat hackers, who look for and report network vulnerabilities before malicious actors can find them. But what about red hat hackers? They are the professionals who specialize in penetration testing, […]
A natural disaster or other emergency can be catastrophic for an organization. Is your workplace emergency plan in good shape? Check out our infographic for 7 steps to make sure you’re prepared to keep your workers safe and your business secure when the unexpected happens. 7 Steps of Workplace Emergency Planning by Safety.BLR.com
There is ever-increasing demand to deploy IP-based surveillance cameras and other security devices. However, wiring can be very challenging, as cameras may need to be placed in areas where running network cabling may be impossible or prohibitively expensive. Fortunately, it can be simple and cost effective to establish a wireless backhaul link, based on Wi-Fi […]
It’s January, and soon enough every working American should be receiving their physical or digital copies of their W-2 or 1099 forms from their employers or contractors. While this provides you with plenty of time to prepare your mid-April filing, it also gives cybercriminals and fraudsters enough time to get their hands on your personal […]
This infographic from IFSEC Global and Cardinus covers 5 common office fire risks that are quite common—and totally preventable. Take a look to review these top hazards and how you can mitigate the risks in your workplace.
The majority of Americans have experienced some type of data breach in their life. How are these real-life run-ins with cybersecurity affecting the way we operate in our own digital lives? To answer this question, Varonis took a closer look at the password security habits of 1,000 Americans.
Black Friday and Cyber Monday are great days to doe some shopping on line for huge deals on sought after gifts for the holidays. They’re also great for hackers looking to profit from the lax cybersecurity practices of many online retailers. And it doesn’t stop there. There’s been a year-over-year increase in cyberattack attempts throughout […]