How To Spot a Phishing Attempt

How To Spot a Phishing Attempt

There are all sorts of ways to communicate with work colleagues these days, including instant messaging, text messaging and more. Though the field has broadened, email still plays an important role in business communications. Hackers know this and email is one – but...
How’s Your Password Hygiene?

How’s Your Password Hygiene?

Passwords are vital for protecting your accounts and data. You know that already, right? But it can’t be repeated often enough. Having passwords is one thing. Using them effectively is another. Let’s look at some password hygiene best practices, and how to create and...

Ransomware: A Hated Malware With an Intriguing Past

Ransomware is a relatively new phenomenon in the field of cybercrime, but it has left a trail of devastated victims in a short time. It works by locking computer files so that they can’t be accessed by the user. It’s a kidnap scenario. The target then receives a...