
Blog
Is a BYOD Policy Right for Your Company?
BYOD, or bring your own device, policies are becoming more common in workplaces around the world. However, there are a number of factors to consider when deciding on BYOD policies which must be taken into account before implementing them.
A Helpful Cybersecurity Checklist for Holiday Travel
Before you go on your next holiday trip, read this article to find out what measures you can take to keep your data secure.
How to Avoid Common Holiday Scams
By being alert to the typical scams and ensuring you're taking necessary safety measures, you can have a wonderful holiday season while shopping online.
Top 10 Phishing Email Subject Lines: Q3 2022
Each quarter, KnowBe4 - the world’s largest security awareness training and simulated phishing platform - publishes the top-clicked phishing emails by subject lines. Here’s a breakdown of their Q3 2022 report.
Why Cybersecurity is Vital to your Non-profit Organization
Just like modern enterprises, non-profits rely heavily on digital technologies such as the internet, cloud computing, and smartphones, but unlike most organizations, non-profits fall far behind in implementing the much-needed cybersecurity solutions to protect their digital assets.
The Penetration Test Vs. The Vulnerability Assessment
Two common assessments cyber technicians use to do this are the penetration test and the vulnerability test, which are sometimes confused for each other. Here's what you need to know about them.