The Risks of Portable Media for Remote Workers
Many removable media are small, affordable, and convenient, making it easy for remote workers to move files from home to office. That, however, also makes it easy for a data breach to occur.
Smart Keeper vs. PadJack: A Product Comparison
Smart Keeper and PadJack are two well-known brands of cybersecurity products, so we thought it would be beneficial to compare the two port lock product lines on a head-to-head basis.
Be Cyber Safe This Summer
While you might be planning to take a break from the office, you shouldn’t plan to take a break from cybersecurity safety precautions. More than ever, cybercriminals are targeting travelers.
U.S. Data Compromises Reach Record High
In 2021, there were more data compromises reported in the U.S. than in any year since the first state data breach notice law became effective in 2003.
That Free USB Stick May Be a Trojan Horse
You just got a free USB flash drive in the mail as part of a Best Buy promotion. So, you plug that flash drive into your USB port and – BOOM! – you get a black screen of death.
8 Ways USB Ports Can Inflict Harm
Here are eight ways your computer’s open USB ports can be used to inflict harm not only on you personally, but also your company.
What is Emotet Malware, and Should You be Concerned?
What started in 2014 as a banking trojan, Emotet has continually morphed throughout the years and is now infecting devices through malicious Excel files being delivered via email.
The Dangers of Public WiFi and Charging Stations
When you use public WiFi, you are potentially exposing yourself to various cyberattacks, such as malware, viruses, hacking, and other forms of intrusion. Similarly, charging your smartphone by connecting it to a USB port can be dangerous.
Malicious USB Flash Drives Making the Rounds
From August to November, the FBI reported that a proliferation of companies had received fake packages from the U.S. Department of Health and Human Services and Amazon that included malicious USB flash drives.
Insider Threats to Guard Against in 2022
While you might think that an insider threat almost always features a malicious actor, most insider threats are associated with employees whose actions have unintentional consequences.
The 5 Biggest Cybersecurity Threats of 2022
Like COVID-19, cybersecurity threats aren’t going away any time soon. In fact, many CEOs view cybersecurity as the No. 1 threat to the global economy over the next five to 10 years. For now, though, let’s just look to the end of 2022. Here are our thoughts on the five biggest cybersecurity threats of 2022.
Your 3-Piece Cybersecurity Travel Toolkit
Now that many of us are traveling again, it’s time to assemble our cybersecurity travel ditty bag. Here are three essentials you need to protect your laptop and smartphone while on the road.