Tech Insights

rss

Contributor Columns on Information Technology and Security

bridge.jpg

A wise man once said – “Tell me and I forget, teach me and I may remember, involve me and I learn.” Benjamin Franklin’s famous quote has since been proven by science; educators now call it “experiential learning." This article presents new ideas for involving remote site workers in the cyber security ...

Two_Factor_Auth.jpeg

The current situation has forced most companies to start working remotely. Hackers see this as the perfect opportunity to exploit vulnerabilities. Every time a remote employee connects to the company network, it is an additional access point that can be exploited. Active Directory (AD) is the core identity and access ...

two-factor-authentication3.jpg

The reality is that, if you don’t have Multi Factor Authentication (MFA) in place, and your employees fall for phishing scams or share passwords, well, your company is widely open to attacks. Compromised credentials represent one of the biggest security threat in today’s world. The reason is simple, compromised credentials ...

cloud-service-data-security-concept1.jpg

More and more companies are now using cloud storage. Using the cloud for your storage does affect the security of your data, but how? 61% of SMBs believe their data in unsafe in the cloud, why? And what can they do about it? SMBs are concerned about their data stored ...

Fotolia_147654979_XS.jpg

Imagine a lifeguard at the beach sitting on his perch. His job is to patrol and monitor for signs of trouble. He sees a surfer being attacked by a shark. Wow, a lot of good it does that he’s in a completely helpless position; by the time he scrambles ...

The Number One Menace to All Organizations
 

Learn more about how to protect your organization against this growing menace
https://info.knowbe4.com/ransomware-simulator-tool-its