TechGuard Blog


Elizabeth Dasenbrock

Elizabeth Dasenbrock
Elizabeth Dasenbrock is a marketer/graphic designer whose mission has always been to creatively express stories and ideas. Her skill set allows her to convey concepts to particular audiences in a visually appealing way. At TechGuard, she works on the marketing team with a focus on graphic design. In her free time, she can usually be found working on personal creative projects, tending to her houseplants, or spending time with friends and family.
Find me on:

Recent Posts

What You Should Know About CISA’s New Joint Cyber Defense Initiative

On August 5th, at the Black Hat USA conference, newly appointed director of the Cybersecurity and Infrastructure Security Agency (CISA), Jen Easterly, called for a partnership between the government and private sectors. Officially titled the Joint...

Awareness ≠ Behavior Change

Let’s face it: the term “Security Awareness Training” has most people’s eyes glazing over on sight. For some, those words even bring about memories of past failed attempts at shifting how employees view their role in security. They are often a stark...

Our Connected World Invites Attackers, Here’s How to Keep Them Out

Today people are always online no matter the time or place. This convenience is an essential part of doing business. Constant connection does come with a cost - increased risks for cyberattacks. In business, connectivity has become a necessity you...

Why Every SMB Needs a Cybersecurity Roadmap

Small and medium-sized businesses (SMBs) are at risk of experiencing a cyberattack now more than ever. In fact, SMBs are a top target of cybercriminals now that there are more remote workers, cloud services, and internet-connected devices than ever...

Stop Spam From Flooding Your Inbox

Spam – We all get it. We all hate it. It can flood our inboxes and cause us to miss important messages. We all know someone, or maybe you are someone who has 50,000 plus unopened emails on a personal account. That is often due to giving an email out...

How to Know If the Employee Training Program Is Working

Studies show that companies are spending a lot of time and money on employee training. So, we know that companies care about getting employees up to speed, but the real question is: "Is it working?" There are multiple ways to measure the effectiveness...

Traveling Cyber Safe in 2021

The pandemic is not over, but we are heading in the right direction. More people are gaining access to vaccinations, and COVID restrictions have loosened up, which means we are starting to see airports fill up with travelers again. That's good news,...

How Businesses Can Combat Password Complacency

Passwords – we all know their importance and why they need to be secure. So why do so many people still have trouble with hackers guessing their passwords and getting into their accounts? Well, it seems that not enough people are putting their...

How Social Engineering Can Improve Your Cybersecurity

You would be forgiven for thinking that social engineering sounds like something from science fiction, but it is very real. Social engineering is one of the most effective tools in a cyber criminal’s arsenal because, quite frankly, hacking a human is...

Hackers Can Ban Your WhatsApp Account Remotely – All They Need Is Your Number

A new vulnerability in WhatsApp allows hackers to suspend and even ban your account without ever needing to access it. That’s concerning coming from a platform with over 2 billion users. The attack is also not very sophisticated either, in fact,...

One Year Later – How COVID-19 Affected Cybersecurity

Covid took the world by storm roughly a year ago, changing daily life as we knew it. Then, while everyone was busy trying to avoid the virus, cybercriminals were already figuring out how to capitalize on it. The confusion and desperation created a...

SonicWall Is the Latest IT Security Vendor to Disclose a Breach in a Growing Trend

An investigation is currently underway after network security provider SonicWall became the latest cybersecurity vendor to confirm a breach on its systems. Allegedly, attackers were able to exploit a vulnerability in the company’s products to access...

1 2 3

 


 

Read More Articles →