This website uses cookies to ensure you get the best experience on our website. Learn more

Cybersecurity Articles

Computer Security Feature Essays

Ransomware Protection Playbook by Roger Grimes

"Ransomware Protection Playbook" by Roger Grimes is a comprehensive guide to protecting against one of the most persistent and devastating threats to businesses and individuals in the digital age: ransomware.

The Pros and Cons of Deploying Security Awareness Training

Security awareness training is a crucial component of an organization’s overall security posture.

The First Steps to Take After Being Hit with a Ransomware Attack

Ransomware attacks are a growing threat to organizations of all sizes, and it is essential to have a plan in place to deal with them.

A Few Interesting Statistics with Regard to Ransomware

According to a report by the Cyber Threat Alliance, the number of ransomware attacks increased by 350% in the first half of 2020 compared to the same period in 2019.

Notable Ransomware Hits Over the Past Five Years

Ransomware is a type of malicious software that is designed to encrypt a victim's files and hold them hostage until a ransom is paid.

Ransomware Prevention Measures for Your Organization

One common method of delivering ransomware is through phishing emails. These are emails that appear to be from a legitimate source and contain a malicious attachment or link.

The Importance of Security Awareness Training

One of the key virtues of security awareness training is that it helps to change employee behavior. Many security incidents occur as a result of human error, such as falling for phishing scams or using weak passwords.

A Few Past and Present Hacker Groups to Learn From

Ransomware is a type of malicious software that encrypts a victim's files and demands a ransom payment in exchange for the decryption key.

Leading Security Awareness Training Organizations in the U.S.

The field of security awareness is a critical aspect of modern business operations, as companies must protect their networks and data from a wide range of cyber threats.

The Dark Web Demystified

As a computer professional or IT specialist, your users know you are there to “take care of the computers”. The scenario is often (but not always) that they have their job to do, and you’ll hear from them when there’s an issue that prevents that from happening.

Do you wish to contribute a technical article on cybersecurity? If so, you'll get your own blog category on our site and your posts may be shared across our IT Specialist Network platform including social networks. Click to read the guidelines.