Join Our Breach Prevention Program 

Start with a Free Dark Web Scan and Baseline Security Assessment. Your Protection is on Us!

Tech Insights

rss

Contributor Columns on Information Technology and Security

We’re told to change our passwords often to minimize getting hacked. Now we’re told this is a bad thing. But not for any inherent techy reason. It’s because frequent password changing makes many people lower their guard when it comes to creating new passwords. They get lax and end up with ...

Cyber criminals have been attempting to extort money from individuals and companies for many years, and the latest attempt to take advantage of others is by using Ransomware as a Service, or RaaS. A ransomware virus infects a computer when a user clicks a link and unknowingly download a malicious ...

It’s been stated more than once that WWIII will most likely be cyber-based, such as dismantling a country’s entire infrastructure via cyber weapons. And don’t think for a moment this doesn’t mean murdering people. A report at bits.blogs.nytimes.com notes that foreign hackers have cracked into the U.S. Department of Energy’s ...

There’s a problem on the home front: security lapses in the computers of the Secret Service and Immigration and Customs Enforcement, says a report on townhall.com. These departments were recently audited, and weaknesses were revealed. Recently, hackers got into the White House, State Department and the Office of Personnel Management, ...

Enterprise resource planning (ERP) is perhaps one of the most boasted-about inventions that cater to the modern enterprise. It rightfully earns this title because of its uncanny ability to boost the efficiency of businesses and provide the needed visibility to make quicker and better-informed decisions in virtually every department. ...