TechGuard Blog


Five Reasons Why E-Learning is the Way to Go

Have you ever attended a large-scale mandated corporate face-to-face training? I have personally experienced a few and they are not as engaging as the E-Learning training platforms that I've used. Usually, you have one or two time slots to choose from...

Are You Ready for CMMC?

Do you do work with the Department of Defense (DoD)? If so, are you preparing for the “CMMC?” If not, you might want to head on over here and take a look at the draft cybersecurity document that’s on the cusp of being implemented.

Microservices: What They Are and What You Need to Know

As a security practitioner, part of the job is to keep up with the changes in technology. This is certainly no easy task as things are changing at breakneck speed. New architectural concepts, the rise of cloud, new data processing models, lots more...

Don't Just Throw Darts

Congratulations - you've made it to a point that most companies have not - you're actually going to be training your employees on cybersecurity!

It's Cybersecurity Awareness Month 2019

October is Cybersecurity Awareness Month and to help improve your state of cybersecurity, we are offering several resources to help your business stay safe from cyberattacks. To start, TechGuard is offering 15% off Security Awareness Training...

How You Can Better Manage Vulnerabilities

Vulnerability Management. How often do you scan your network for vulnerabilities? What does your process for remediating these vulnerabilities look like? If you’re like most companies, you might scan once a year with your yearly compliance penetration...

Medical Devices are Vulnerable to Cyberattacks

It's not easy to place a recall on implanted medical devices. Imagine what that could look like for someone with a pacemaker. Consider the consequences of a vulnerability that allows a malicious actor to take remote control over a device like this....

Compliance: You Actually Need It

One of the first steps to start your security program is finding out where you are the most vulnerable. Usually, the best way to do this is using a process or a tool that can track the risks associated with each individual asset that your business...

Computer Security Doesn't Equal Business Security

Five Places You May Have Dropped the Ball It wasn't that long ago that businesses' largest concern was having a decent lock on their doors to secure the premises. It's obvious that we've come a long way and so have bad actors. Fast forward a bit and...

Passwords, Lies and Webcam Recordings

Email content filters have come a long way in recent years. Tremendous strides have been made in protecting us from the never-ending wave of malware and malicious intent. However, cybercriminals (if nothing else) are very creative and not easily...

Business Email Compromise Scams are Through the Roof

Everyone is on the alert and it's for good reason. Just a week ago, the Feds indicted 80 people in a massive fraud conspiracy. U.S. Attorney Nick Hanna states, "We believe this is one of the largest cases of its kind in U.S. history." According to the...

I Was Going To Get To That

With new tools and technology constantly being introduced into the market, have you ever wondered why vulnerabilities that have been around for years just won't die? One big reason is PATCH MANAGEMENT.

1 2 3 4 5
... 9

 


 

Read More Articles →