TECH INTELLIGENCE: Preparing a game plan
Chief security officers and others are constantly playing defense against nation-state and other hackers who mount billion-dollar offenses.
Edison-based Zerify launches enhanced security for virtual public meetings
The video conferencing feature allows a host to lock an event with a single click, instantly preventing unauthorized access via shared emails or available links.
TECH INTELLIGENCE: Off the hook
Regardless of the size of a business, the industry vertical, or the geographic location, cybercriminals treat ransomware as "the gift that does not stop giving."
TECH INTELLIGENCE: Act now
Too many people continue to lack awareness about the threat posed by cybercriminals, and many business owners think they will never be targeted.
TECH INTELLIGENCE: Blocking and tackling
It's no surprise that savvy entrepreneurs regard cybersecurity as a top priority, recognizing that their companies need to employ effective strategies to protect their information assets.
TECH INTELLIGENCE: Return of the zombies
Nobody wants to be around them, especially in October as Halloween draws closer. But here is a spooky thought: your business may be a breeding ground for this cybersecurity threat.
TECH INTELLIGENCE: Something wicked this way comes
LOTL – or Living Off the Land – attacks are scary because they use legitimate software and functions already in a system and perform malicious actions on it.
TECH INTELLIGENCE: The new imperative
An uncertain economy is driving many companies to look for ways to cut back on spending, which is not unusual. But some companies are gutting their cybersecurity activities, which will only harm them in the end.
TECH INTELLIGENCE: A better strategy
Passwords are the bane of our existence. But there are alternatives.
TECH INTELLIGENCE: Cards on the table time
Small- and medium-sized businesses often have a limited cybersecurity budget — and cyber criminals realize this. But an affordable practice called a tabletop exercise may be able to help SMBs fend off these crippling attacks.
TECH INTELLIGENCE: Safe suppliers
Many businesses are working closely with their outsourced IT support provider to shore up digital defenses. But what happens when a company’s vendor gets hacked?
TECH INTELLIGENCE: Weak links
Successful business owners routinely assess issues like competition, marketing, customer demand and other questions. But for some reason, many often skip a critical issue: their cybersecurity posture.















