When it comes to cybersecurity, you probably think of protecting computers, apps, or online databases first and printers last. Precisely because they’re overlooked in, printers can be exploited by hackers and used as a gateway to infiltrate your systems. Secure your networks against intruders by following these steps. What makes business printers vulnerable to cyberattacks? […]
While not always accurate in its portrayal of hackers, Hollywood does get at least one thing right: there are many types of hackers out there, all with varied methods and motivations. In this article, we’ll take a look at three main types of hackers. A complicated history In the 1950s, the term “hacker” was vaguely […]
What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who presents their findings to vendors to help them improve the quality of their products? There is more than one type of hacker, and understanding the difference is important. A complicated history In the […]
The bring your own device (BYOD) strategy lets employees use their personal mobile devices to do work for your company from anywhere. This strategy increases efficiency and convenience to your business, but it also brings a number of security risks to your IT infrastructure and data. If you’re thinking of incorporating BYOD in your office, […]
What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who takes their findings to vendors to help them improve the quality of their products? There is more than one type of hacker, and understanding the difference is important. A complicated history Since all […]
As shown by recent high-profile hacking scandals – targeting everyone from Sony Entertainment to the extramarital-affair-facilitating website Ashley Madison – cyber crime shows no sign of disappearing any time soon. In fact, experts predict that 2016 is going to be an even busier year for cyber criminals, hackers and scammers. So what do you need […]
Recently corporations have been targeted by scammers posing as executives or employees in order to initiate unauthorized international wire transfers. The so-called “spoofers” simply create a valid sounding email domain name and con businesses into sending money. According to the FBI, “CEO fraud”, “spoofing” and “business email compromise” has taken nearly $750 million in comparable scams from nearly 7,000 companies in the U.S. between October 2013 and August 2015.