9 essential cybersecurity phrases

9 essential cybersecurity phrases

As with all technology, trendy phrases come and go with the passing of every IT conference and newly released virus. And when dealing with cybersecurity, keeping up with them all can mean the survival — or demise — of a business. If you’re looking for a list of the industry’s most relevant terms, you’ve come to the right place.

93,000 Websites Compromised: A lesson in using secure passwords

Here's the latest news in online hacking!
Researchers revealed in early December that hackers had compromised approximately two million accounts across 93,000 websites including Facebook, Google, LinkedIn, Yahoo! and Twitter. This breach in data (and confidentiality) was a result of keylogging software maliciously installed on an unknown number of computers around the world.

BYOD Management – Employee Devices + Corporate data = Big Risk?

One question we are getting lately from many customers lately is how to manage the influx of employees' devices that can connect to the corporate network. We call this phenomenon BYOD, or Bring Your Own Device. The device can be a smartphone such as an iPhone or Android, a tablet like the iPad, or even a home PC or laptop.