We know we hype up multi-factor authentication, or MFA, quite a bit on this blog, and for good reason. When implemented correctly, it can be an effective deterrent for many cyberthreats out there. However, as they often do, hackers have found ways around MFA. Let’s take a look at how hackers find ways around MFA protection. Read More
- Published: 31 Jan 2022
Penetration testing is a term that you often hear about, but won’t really understand it unless it is completely explained to you. Well, you’re in luck because in today’s blog we will explain what penetration testing is and why it is important for data and network security and maintaining compliance with regulatory requirements that your
- Published: 01 Oct 2021
The Internet of Things, a collective term for the countless connected devices out there that have traditionally not been connected to the Internet, is a vast and dangerous territory for businesses to cover, perhaps now more than ever before. Unfortunately, this massive group of connected devices also tends to make itself a target for hackers
- Published: 27 Sep 2021
Some vulnerabilities can fly under the radar for quite some time, some for months or even years. This is the case with a recently discovered Microsoft Azure database vulnerability. The exploit, discovered by cloud security provider Wiz, is found in Cosmos DB, Microsoft Azure’s managed database service, and it’s a real nasty one at that.
- Published: 27 Feb 2019
Sometimes threats come from the most unlikely places. One such threat came in the form of Apple’s FaceTime app, which gives users the ability to spy on others without their consent through group FaceTime calls. Even though a patch has been issued that solves the problem, it’s still worth reflecting on.
- Published: 13 Feb 2019
Businesses that have been around the block a time or two may have discovered specific software titles that yield little-to-no results. Some might even be security risks that you simply aren’t willing to expose your data to. The free or cheap software found by some organizations to make up for operational deficiencies don’t always cut