News

Risks of File-Sharing Technology

File sharing involves using technology that allows internet users to share files that are housed on their individual computers. Peer-to-peer (P2P) applications, such as those used to share music files, are some of the most common forms of file-sharing technology. However, P2P applications introduce security risks that may put your information or your computer in…
Read more

Understanding Patches and Software Updates

Patches are software and operating system (OS) updates that address security vulnerabilities within a program or product. Software vendors may choose to release updates to fix performance bugs, as well as to provide enhanced security features. https://us-cert.cisa.gov/ncas/tips/ST04-006
Read more

CIS Controls Telework and Small Office Network Security Guide

Routers, modems, and other network devices act as the on-ramp for private networks to access the internet. Although these network devices are developed and marketed for home usage, they are often purchased by small to medium-sized organizations and used in a professional enterprise setting. Furthermore, the trend of teleworking is gaining momentum, and employers are…
Read more

Data Breach Investigations Report – Verizon 2020

Here we are at another edition of the DBIR. This is an exciting time for us as our little bundle of data turns 13 this year. That means that the report is going through a lot of big changes right now, just as we all did at that age. While some may harbor deeply rooted…
Read more