TechGuard Blog


Growing Cybersecurity Trends in 2020

  It’s a year that will never be forgotten – the year that will forever go down as one of the “worst years ever.” Sure, that might be a little dramatic, but we can all agree it has been an interesting roller coaster of events. One event we're seeing...

CCPA Compliance and What This Means for You

On June 28th, 2018, California signed a new law called the California consumer privacy act (CCPA), which went into effect on January 1st, 2020. On July 1st, 2020 this law went into its enforcement phase. What this entails is that California's Attorney...

Time’s Up, TikTok: The Hidden Security Risks

I’m sure you’ve all heard of the social media app, TikTok, by now, yeah? Even if you don’t have the app on your phone or you don’t know much about it, you’ve probably heard of others using it or you’ve seen the videos popping up left and right on your...

The Online Youth: How Risk-Aware Are They?

In the past, this article has been more technically focused. For this article, I decided to take a different approach. In the IT Security field, we stay pretty plugged into the technical community. Most of us have our favorite articles or publication...

An Apple a Day Keeps the Hackers Away

In recent weeks, Apple has announced its bold new security move that will have a positive security impact on everyone. This new security move will be changing how we access our browser and will essentially boost security for all its users – which is...

Staying One Step Ahead of Mobile Security Threats

What’s one of the first things you do when you wake up? A high percentage of individuals will answer “check my phone, “or “check my email,” which is inevitably linked to their mobile device anyway. We get it – it’s easy, and it’s way more convenient...

UPnP Devices at Risk from New Vulnerability

Universal Plug and Play (UPnP) has been a security nightmare since its inception over a decade ago. This technology is generally found in consumer-grade networked devices and allows them to discover other UPnP devices automatically on the network to...

A Deeper Look Into “Zero Trust” Security Strategy

What exactly is a Zero Trust security strategy? In general, this strategy simply means that not one person is trusted by default to access your secured network – no matter how high up they may be in the company – secured verification is required 24/7...

Newest Player in the Ransomware Game, Netwalker, Targets Universities

Over the past few weeks, there have been attacks carried out against universities in the united states where the attackers have been successful in stealing unencrypted data and then encrypting the university computers for ransom. The data taken from...

Back to the Basics: Security 101

Over the past few months, there has been much talk about COVID-19 and what it means for businesses with employees working from home. Today, I thought I would change it up and get back to the basics of cybersecurity to talk about a type of attack that...

How to Create a Work Culture of Holistic Risk Awareness

We’ve all been there – or most likely have been – on the receiving end of that annual (or semi-annual) email reminder with the subject line “URGENT: Mandatory Security Training Module.” Most employees may not even bother opening it, but that’s where...

Working Remotely? Beware of These Top Three Online Threats

We’ve been warning our readers of recent, emerging threats since the beginning of the COVID-19 pandemic – and we won’t stop. The cybersecurity risk level has skyrocketed while cybercriminals are leveraging on all things COVID-related. Hackers are...

1 2 3 4 5

 


 

Read More Articles →