Human Firewalls: What They Are And Why They're Important

What is a Human Firewall?

Human Firewalls are comprised of a group of people from your organization with a mission to detect scams such as ransomware or phishing attacks that sometimes bypass your computer security systems. These attacks need a...

Facebook: The Good and The Bad

Facebook is frequently in the press, sometimes with data leaks and last October a possible $1.6 billion fine for violating GDPR compliance after a recent data breach. From an IT Engineering perspective, they have done some amazing things, which I’ll...

Tiny Banker Trojan Breakdown: Origins & Mitigation

Tiny Banker, also called Tiny Banker or Zusy, is an example of a banking trojan, and by understanding Tiny Banker, we can understand the tactics, techniques, and procedures of banking trojans, as well as understanding how to detect and protect...

Professional Software for Non-Profit Organizations…For Free

Wouldn’t you love for your non-profit organization to have access to some of the tools that you use for business? Think about being able to collaborate on documents, securely share access credentials, centrally store policy and process information,...

How to Remediate the Recent Dell SupportAssist Remote Code Execution Vulnerability

by Jason Shapiro | May 14, 2019 | Security, cybersecurity

Any IT technician that has installed Windows knows how much of a pain it can be to install all of the correct drivers and keep them up to date. It's gotten easier over the years with improvements to Windows Update and the various tools that now...

Subscribe Here For Our Blogs:

Recent Posts

Categories

see all