Belief in myths can be harmless. But when that belief leaves you with a stolen credit card or a compromised corporate network, the consequences are all too real. Here are some common myths that plague cyberspace, and solutions to deal with ...
We’ve all read about various forms of cybercrime and its various levels of impact. Oftentimes we hear about a company whose network has been compromised, leading to the loss of sensitive information. But that’s just one scenario out of many...
In many ways, your email account is the digital equivalent of your house address. You give it to people and businesses, so they know where to send the products and helpful information you requested. It offers a way to keep in touch with fam...
A strong password should include a mix of lower-case and upper-case letters, numbers, and special characters. However, the overall password length is even more important than the characters used, as password cracking programs will start wit...
Ransomware has been getting a lot of headlines most recently, but a new version of ransomware has arrived and it is even more dangerous than its predecessors. It’s called Ransom-Cloud and it has the power to encrypt cloud-based emails and f...
By Jake Olcott, VP Government Affairs at BitSight
If you’ve glanced at the opinion columns of security industry publications, you’ve probably seen the term