The IT Pro Blog
Category: Security
We actually write these blogs. Yes, you read that right. Our team of IT pros compile knowledge from the job and years of experience, combined with real-time updates of what we see in the field, to bring you value-add content on a weekly basis.
Beware of these 4 types of hackers
Hackers come in all shapes and sizes. From kids wanting to gain notoriety on the internet to political groups trying to send a message, the
4 Social engineering scams to watch out for
Experts are constantly creating new security systems to protect individuals and businesses from hackers. From those who want to attend popular events like the Olympics
5 Simple but effective cybersecurity tricks
Can you name five cybersecurity best practices? Most people can’t, and few of those who can, actually follow them. Unfortunately, cyberattacks are far too common
4 BYOD security risks you should prepare for
Personal computing is with us wherever we go. Thanks to the rise of the mobile industry, smartphones and tablets allow us to take work home
New Spectre-style attack discovered
Security experts are constantly discovering new potential threats, and quite recently, they’ve found a new type of Spectre-style attack more dangerous than the original. Here’s
IT security policies your company needs
When it comes to Internet security, most small businesses don’t have security policies in place. And considering that employee error is one of the most
Regularly evaluate your cybersecurity
Experts estimate that the global market for cybersecurity products this year will exceed that of last year. At first glance, an increase in spending seems
Malware strain infects 200k more devices
Yet another global malware infection has been making headlines and the story just took a turn for the worse. When the news of VPNFilter broke,
HTTPS matters more for Chrome
HTTPS usage on the web has taken off as Chrome has evolved its security indicators. HTTPS has now become a requirement for many new browser
Recent Posts
- History Repeats Itself as Henry Schein Restores Systems Yet Again
- Companies Face Risks of Employees Downloading Software Without Permission
- Ransomware Attack on Johnson Controls Takes Down Its Subsidiaries
- Official FBI Warning: Extortion Groups Are Targeting Plastic Surgery Offices
- Microsoft Teams Meetings: Best Practices and Etiquette