The Top Security Threats for SMBs
Many smaller organizations don’t consider themselves to be a target of cybercriminals. The “we’re too small to be w…
Email Retention Policy Best Practices
Does your business need an email retention policy? If you’re in finance, healthcare, government, or any other heavi…
What Is Social Engineering, and How Is It Used in Cybersecurity Attacks?
Social engineering sounds nice, and in some contexts, it is. Social engineering can mean shaping the development an…
Why Multi-Factor Authentication Is Important for Businesses
Passwords are a lot like keys. Some keys are better and more sophisticated than others, and a locked door is obviou…
What's the "Swatting" Tactic?
First off, swatting isn’t anything new, and it has nothing to do with bugs of any kind, let alone the computer vari…
What Is Data Governance and Why Is It Important?
The Data Governance Institute defines data governance as “a system of decision rights and accountabilities for info…