Acronis Cyber Protect Home Office: The full image backup tool to meet today’s demanding needs

Jack Wallen tests the Acronis Cyber Protect Home Office app, a disaster recovery tool anyone can use to create a full disk clone of crucial systems with ease. The... Read more »

FBI warns of phony cryptocurrency apps aiming to steal money from investors

Cybercriminals are creating fake cryptocurrency investment apps designed to defraud US investors and exploit investment firms, cautions the FBI. The post FBI warns of phony cryptocurrency apps aiming to... Read more »

Tech companies pledge free cybersecurity training at White House summit Tuesday

The goal is to help alleviate the estimated 700,000 vacancies in cybersecurity jobs in the U.S. The post Tech companies pledge free cybersecurity training at White House summit Tuesday... Read more »

Cyber Safety Review Board classifies Log4j as ‘endemic vulnerability’

CSRB has released a report saying that the Log4j exploit is here to stay long-term, meaning businesses should be ready in case of a cyber attack. The post Cyber... Read more »

5 tips for securing SSH on your Linux servers

Jack Wallen offers 5 tips for securing Linux that you can take care of in 5 minutes or less. The post 5 tips for securing SSH on your Linux... Read more »

LinkedIn and Microsoft are the most impersonated brands in phishing attacks

LinkedIn was exploited in almost half of the phishing attempts seen by Check Point Research during the second quarter of 2022. The post LinkedIn and Microsoft are the most... Read more »

Leveraging the power of cyber fusion centers for organizational security

Cyber fusion centers provide advanced security capabilities. Learn how your organization can strengthen its cyberdefense mechanism through a cyber fusion center. The post Leveraging the power of cyber fusion... Read more »

Trellix finds business services top target of ransomware attacks

Ransomware groups are now starting to pick sides in the Russian-Ukrain conflict. Learn more about who and what are at risk. The post Trellix finds business services top target... Read more »

Why North Korean cybercriminals are targeting businesses with ransomware

Microsoft says a ransomware gang calling itself H0lyGh0st may be sponsored by the North Korean government as a way for the country to offset its struggling economy. The post... Read more »

Best VPN services for SMBs

VPNs are an essential component in small and medium-sized businesses’ cybersecurity toolkit. Here’s how leading VPN services for SMBs compare. The post Best VPN services for SMBs appeared first... Read more »
Subscribe to our Newsletter