Business Continuity Planning: Are You Planning for the Worst?

Business Continuity Planning: Are You Planning for the Worst?

Business continuity planning is important when running a business. No business is immune to disasters. And it only takes a single disaster to force businesses to shut down permanently. With business continuity planning, you can protect your business from disasters,...
Web Browser Security: Protecting Against Online Threats

Web Browser Security: Protecting Against Online Threats

Are you using a secure web browser? Some web browsers are more secure than others. Failure to use the right web browser can place you at risk for man-in-the-middle (MITM) attacks, cross-site scripting (XSS) attacks, malware infections and more. For a better...
What Is Capability-Based Security?

What Is Capability-Based Security?

Have you heard of capability-based security? While not as popular as role-based security, it offers iron-clad protection against many types of cyber threats. Many operating systems — particularly those used for research purposes — use capability-based...
Macro Malware and What Means for Your Business

Macro Malware and What Means for Your Business

If your business uses Microsoft Office or similar word-processing apps, you should take precautions to prevent macro malware infections. Research shows that a staggering 1 billion plus people worldwide use Microsoft Office. While some people use it for personal...
Pros and Cons of Using a Stateful Inspection Firewall

Pros and Cons of Using a Stateful Inspection Firewall

Not all network-based firewalls are the same. There are many different types of network-based firewalls, one of which is stateful inspection. Also known as stateful firewalls, stateful inspection firewalls are designed to track the sessions of users while they are on...
5 Common Myths About Vulnerability Scanners

5 Common Myths About Vulnerability Scanners

For a more secure information technology (IT) infrastructure, you should consider using a vulnerability. It will protect your business’s networks, computers and devices from a variety of cyber threats. As the name suggests, vulnerability scanners are designed to...