What is Shadow IT

What is Shadow IT and Why is It so Dangerous?

The practice of users using unauthorized technology resources to bypass their…


NIST Incident Response Plan

NIST Incident Response Plan: Steps and Template

In the ‘Computer Security Incident Handling Guide,’ also known as…


Black Basta Ransomware

Black Basta​ Ransomware Emerging Threat out in the wild, Cyber Security Experts Warn

Black Basta​ Ransomware (RaaS) syndicate has claimed nearly 50 victims in the…


Google Password Manager

Google Password Manager Enhances the Security Across all its Platforms

Google Password Manager unveiled several updates to its service on Thursday to…


ZuoRat

Small Office/Home Office Routers taken over by ZuoRAT, a Malware that Spies on Networks

ZuoRAT Malware attacks Small office/home office (SOHO) routers, a previously…


AVERAGE RANSOM PAYMENT HAS GONE UP TO 71% IN 2022

Palo Alto Network’s threat intelligence arm, Unit 42, has found the average…


Ch-1. Introduction to Cyber Security for Small and Medium Businesses

Welcome to our Cyber Security Guide for Small and Medium…


What is data retention and why is it important?

What is data retention and why is it important?

It’s not uncommon to hear about businesses storing large volumes of…


5 Tips for Measuring Your Company's Security

Cybersecurity is a priority for any organization and a big-ticket budget line…


Log4J Vulnerability

The Log4j Vulnerability is Not Over Yet - Microsoft Reports More CVEs

The vulnerability mayhem has been the talk of the cyber town for slightly over…