Security

shadowy figure

Gaining Visibility into Shadow IT: The Case of NASA JPL

What comes to your mind when you hear the term ‘Shadow IT?’ For some people, they first think about Ra’s al Ghul’s League of Shadows –formerly referred to as League of Assassins- in the film Batman. This answer is not far from the truth because Shadow IT is an assassin targeting organizations with huge adverse…

Read More
user on laptop with email

3 Pillars of Email Authentication: SPF, DKIM, and DMARC

Since the advent of the internet, spam mail has been on the rise. 45% of emails sent are spam emails equating to about 14.5 billion spam emails daily. Many businesses and individuals fall victim to spam emails every day. Spam Email has adverse effects including increasing security breaches, decreasing productivity, and huge financial repercussions. The…

Read More
User accessing macbook air

Zero-Day Zoom Webcam Vulnerability targeting Apple Macs announced

Apple Macbooks and iMacs have been long praised for their built-in security features and access restrictions, unfortunately, the software you install on your Macbook, not so much! Yesterday, Jonathan Leitschuh provided a post on Medium, the popular blog aggregation service, about a zero-day vulnerability in Zoom’s Conferencing software the opens your Apple MacOS computer to…

Read More

The Top 7 Security Threats Small Businesses Will Face in 2019

A new year brings new security challenges. To make things more difficult, the old challenges aren’t necessarily going away. Security risks pose potentially significant problems for small and medium businesses not prepared for them. If you fail to address them, there’s a good chance your business never recovers. Fortunately, it’s not all bad. The first…

Read More