Hackers come in all shapes and sizes

Hackers are known by the general public as cybercriminals, especially with so much news about nude celebrity photos beings released to the cloud, millions of customer information being stolen across many industries, and government agencies paying the ransoms hackers demand so that the former can regain access and control of their systems.

Office 365 hacking: What you need to know

With over 150 million active subscribers, Office 365 is, unsurprisingly, on top of hackers’ minds. And now, hackers are using a technique that doesn’t even require users to give up their credentials. Learn how they do it and get protected.
A phishing scam that harvests users’ credentials
The latest cyberattack on Microsoft Office 365 involves harvesting users’ credentials.

Cybersecurity: How to defend against insider threats

In the cybersecurity world, an insider threat is an individual or business partner who uses company data inappropriately. Today's companies must take proactive steps to prevent insider threats, which is why we put together some tips and tricks.
#1 Educate
You must teach your team to recognize personally identifiable information (PII) and understand the financial implications of a breach.

Cybersecurity for small- and medium-sized businesses

Has your organization been hit with a data breach or ransomware recently? This happens more often than you might think to businesses of all sizes. Given the frequency, complexity, and increasing number of threats, a multi-level, agile, and cutting-edge cybersecurity strategy is the only response that will protect businesses from massive losses.

A closer look at fileless malware

To avoid detection by antimalware programs, cybercriminals are increasingly abusing legitimate software tools and legitimate programs in systems to steal data or ruin its integrity. They use fileless malware to infiltrate trusted applications and issue executables that blend in with normal network traffic or IT/system administration tasks while leaving fewer footprints.

The dangers of autocomplete passwords

Hackers have found a new way to track you online. Aside from using advertisements and suggestions, they can now use autocomplete passwords to track you down. Feeling unsecure? Here are some ways to keep you out of harm’s way.
Why auto-fill passwords are so dangerous
As of December 2018, there are 4.1 billion internet users in the world.

Benefits of using a VPN

While using a virtual private network or VPN isn’t a silver bullet to online privacy threats, it still offers crucial security benefits, especially if any part of your day involves using unsecured channels such as public Wi-Fi. Given its importance, how do you pick the right one and what factors do you need to consider?
What is a VPN?
The best way to describe a VPN is as a secure tunnel between your device and destinations you visit on the internet.