Data security should always be treated as a priority. We know—this isn’t exactly a small ask, so to help, we’ve put together a few tips to get you started off on the right foot.
In this article we will outline some of the unique issues that law firms have regarding cyber security risks, as well as outline a four-step plan designed to help reduce a firm's chance of experiencing a serious cyber security incident.
Credential stuffing is another means that cyber criminals can use to access your accounts.
It’s no wonder that the username/password combination that we’re all used to is being actively phased out by many tech companies—including Microsoft—in favor of more secure, passwordless authentication measures.
We’ve made a list of four questions that you’ll need to answer to ensure your business is doing the right things when it comes to securing your data.
We’re pretty outspoken in our support of VPNs (virtual private networks) as an indispensable tool for your online security. However, considering that there are things that a VPN can and can’t do, we thought it would be helpful to specify what a VPN is really for.
Let’s go over a few signs that a message you receive might be a phishing attack.
In a recent security update, most Android and iOS phones received a new opt-in setting related to the COVID-19 Exposure Notification system. What is this? Is your phone being tracked? Let’s take a deeper look at what is going on.