With technologies, such as Unified Threat Management, Advanced Persistent Threat Protection and Privileged Access Management, information security is often complex and expensive. However, one of the most powerful security tools is simple and can be produced at no cost. Often overlooked, and more often underappreciated, the power of the password should not be overlooked. Passwords are […]
Continue reading
Every day we hear of another security breach that makes the news or a friend who’s email account has been hijacked. Tech savvy people are becoming more concerned about becoming the target of a security breach. Unfortunately, these concerns are well founded. According to a recent TeleSign Study, 51% of online users were hacked between January […]
Continue reading