Tech Insights

rss

Contributor Columns on Information Technology and Security

Fotolia_80058986_XS1.jpg

Burglars get burgled, muggers get mugged, and hackers get hacked. This includes a sophisticated ring of hackers: Hacking Team, hailing from Italy, specializing in selling hacking software to major governments. An article on wired.com describes how a “400 gigabyte trove” went online by anonymous hackers who gutted the Hacking Team, ...

Man_looking_up_in_sky.jpg

Proposals are one of the most expensive things you will spend your time on in a small business (or a large business, for that matter). You not only spend tons of time discovering and understanding what the client needs, but you also spend countless hours (often late at night) ...

Fotolia_58169302_XS.jpg

Most small businesses don’t put as much focus on internet security as they probably should. If you are a small business owner or manager, not focusing on internet security could put you in a bad spot. Are you believing the myths about internet security or are you already using ...

Fotolia_63999910_XS.jpg

The Ponemon Institute released a shocking statistic: about 80% of all corporate data leaks is due to human error. In other words, it only takes a single staff member to cause a huge issue. Here’s a scenario: Let’s say that you have an employee, Betty. Betty is lovely. We ...

For more than four years, malware has been posing as legitimate software and infecting industrial equipment across the globe. The malware, which looks just like the Siemens control gear software, has affected at least seven plants in the US. According to security experts, the malware was specifically designed to attack ...

The Number One Menace to All Organizations
 

Learn more about how to protect your organization against this growing menace
https://info.knowbe4.com/ransomware-simulator-tool-its