Tech Insights

rss

Contributor Columns on Information Technology and Security

OpenSSL vulnerabilities are sticking around for a while. In fact, recently two new ones were announced: One allows criminals to run an arbitrary code on a vulnerable computer/device, and the other allows man-in-the-middle attacks. A more famous openSSL vulnerability that made headlines earlier this year is the Heartbleed bug. Might ...

Don’t think in terms of “if” you’ll suffer a data breach, but rather, “when.” Once you establish this mindset, it’s time for you to develop a response plan. After all, a security system that’s impenetrable has yet to be invented. What’s even more, an amazing number of businesses don’t even ...

Being a DBA in today’s world can be hard. Really hard. Not only are the daily challenges growing as businesses rely more and more on applications to engage with their customers, there are several technical and cultural shifts that are putting enormous pressure on “traditional” DBAs to change how ...

In this age of advanced technologies, there seems to be no limit to where we can go and what we can do on the Internet. Still, in navigating the worldwide web we make ourselves vulnerable to cyber crimes committed by those bent on using the Internet for illegal and ...

When it comes to protecting an organization’s information, flaws with this can involve either implementing strong technology to protect too much trivial data, or inadequate protection of important and sensitive data. In short, not enough attention is cast upon a company’s most important information; there’s a gap between the IT ...

The Number One Menace to All Organizations
 

Learn more about how to protect your organization against this growing menace
https://info.knowbe4.com/ransomware-simulator-tool-its