Imagine, you have arrived at a networking event and the host introduces you to Richard, a cleaning company owner. Just as you politely smile and shake Richard's hand, he starts telling you about the most advanced floor polisher he’s bought, and the green commercial grade disinfectant he uses, and...
Search Results
10 Tips to Develop Cybersecurity Knowledge Within Organizations
They say once you learn to ride a bike, you never forget. When it comes to cybersecurity, that bike is constantly changing, and the learning never stops. Continuing education is important for many professions, but it’s essential that everyone in the organization receives training in...
4 Ways to Protect Your Business from Cyberattacks
Since the beginning of the COVID-19 pandemic, businesses have quickly adopted remote working and transitioned to new technologies, such as contactless payments and online ordering. Unfortunately, these adjustments have come with increased risks. According to a 2022 report from Barracuda, a cloud...
Three Steps to Make Your Business Harder to Hack
The U.S. Small Business Administration recently launched a new pilot program to help small businesses improve their cybersecurity infrastructure. As business owners everywhere face increasing cyber risks and challenges that could cripple their operations, the SBA has committed to awarding millions...
Prioritizing Cybersecurity Training During the Onboarding Process
In this interview with Help Net Security, Brent Johnson, CISO at Bluefin, talks about the importance of making cybersecurity training a priority for every organization and why this is often a difficult goal to achieve. There has been a lot of talk about the Great Resignation lately, and companies...
Workflow Automation: What It Is and How It Can Make Your Job Easier
Workflow automation, also called data automation, is the new buzzword in the tech industry, but what is it, really? To put it simply, workflow automation means getting information into a system, launching tasks to process the data, and routing it to the correct people. This process is done using...
Confronting the Ransomware Crisis: Advanced Common Sense Advice
We are facing a ransomware crisis that has already impacted our society and continues to cause havoc and devastation. Ransom attacks, banking on stolen information, are also on the rise and will soon surpass ransomware attacks due to the simplicity of the crimes. In the recent ISACA Ransomware...
Voice Cloning of Growing Interest to Actors and Cybercriminals
As voice cloning technology has become ever more effective, it is of increasing interest to actors... and cybercriminals. When Tim Heller first heard his cloned voice he says it was so accurate that "my jaw hit the floor... it was mind-blowing". Voice cloning is when a computer program is used to...
How to Keep Internet Trolls Out of Remote Workplaces
When companies move all employee communications online, they face the same problems as the rest of the internet. But they don’t have to let bad behavior seep in. Gustavo Razzetti, who gets hired by companies to improve their work cultures, has noticed a change since the pandemic began last year:...
5 Platforms That Help You Assess Candidates’ Skills
Few things are more frustrating for recruiters than discovering late in the interview process that the candidate they thought was a superstar has been exaggerating their skills. Not only do you lose out on that candidate in particular — but you also have wasted valuable time that could have been...