Executives, ask your IT team: How long ago did we practice a complete system restore? You do not want your first practice to be when your team attempts to restore lost data after ransomware encrypts your most important data. When everyone is in a frenzy trying to deal...
Your IT Team has an opportunity to patch a security weakness in your Dell computers. If you facilitate them acting now, you will probably be one step ahead of attackers. The good news is Dell’s not detected any attacks in the wild. However, now bad actors have a...
Whether you use an Android or Apple phone, Apple created a short 2-minute video that explains a new privacy feature. The knowledge in the video explains privacy concerns that Android users need to know about too: Apple’s new App Tracking Transparency feature...
Hackers competing in this year’s PWN2OWN competition earned hundreds of thousands of dollars. Who paid them? The companies they hacked. But it isn’t ransomware; this is an example of bug bounty activities. Companies, including Microsoft, Zoom, and Apple...