Jack Wallen tests the Acronis Cyber Protect Home Office app, a disaster recovery tool anyone can use to create a full disk clone of crucial systems with ease. The... Read more »
Cybercriminals are creating fake cryptocurrency investment apps designed to defraud US investors and exploit investment firms, cautions the FBI. The post FBI warns of phony cryptocurrency apps aiming to... Read more »
The goal is to help alleviate the estimated 700,000 vacancies in cybersecurity jobs in the U.S. The post Tech companies pledge free cybersecurity training at White House summit Tuesday... Read more »
CSRB has released a report saying that the Log4j exploit is here to stay long-term, meaning businesses should be ready in case of a cyber attack. The post Cyber... Read more »
Jack Wallen offers 5 tips for securing Linux that you can take care of in 5 minutes or less. The post 5 tips for securing SSH on your Linux... Read more »
LinkedIn was exploited in almost half of the phishing attempts seen by Check Point Research during the second quarter of 2022. The post LinkedIn and Microsoft are the most... Read more »
Cyber fusion centers provide advanced security capabilities. Learn how your organization can strengthen its cyberdefense mechanism through a cyber fusion center. The post Leveraging the power of cyber fusion... Read more »
Ransomware groups are now starting to pick sides in the Russian-Ukrain conflict. Learn more about who and what are at risk. The post Trellix finds business services top target... Read more »
Microsoft says a ransomware gang calling itself H0lyGh0st may be sponsored by the North Korean government as a way for the country to offset its struggling economy. The post... Read more »
VPNs are an essential component in small and medium-sized businesses’ cybersecurity toolkit. Here’s how leading VPN services for SMBs compare. The post Best VPN services for SMBs appeared first... Read more »