TechGuard Blog


Don’t Fall Victim to a Cyberattack – Know the Signs

*WARNING: content might inflict a sudden urgency to assess your company’s cybersecurity* You can never be too sure that your system is fully protected. Even with the latest technology, firewalls, software and security measures, you’re still a wading...

Ransomware: A Proactive Approach

Ransomware is a word that companies dread because, for them, it means spending time, resources, and money to fix a completely unexpected problem. However, from a cybersecurity standpoint, the fact that businesses aren't expecting an attack seems to be...

How to Get past the Password Problem

Passwords as a security measure are swiftly becoming obsolete as technology, and cybercrime advances. Weak passwords are too easy to hack, and strong passwords are too complicated to remember. Make sure you have a different password for every account but...

Camera App Vulnerability Allows Hackers a Look at Your Private Information

What is the most un-nerving action hackers can do to your smartphone? Perhaps, hack into your camera and watch you as you go about your day? What about jack into your microphone and listen to everything you say in your daily meetings? Well, a series of...

How You Can Reduce the Ransomware Spikes

According to CNN Business, there were 140 ransomware attacksto local governments, schools and hospitals from January 2019 through October. The increase in ransomware this year is likely connected to the increase in payouts. It makes perfect sense that a...

Open Source Software - Common Vulnerabilities

The proof, as they say, is in the pudding In a previous blog post I wrote about addressing concerns with Open Source Software (OSS). In that blog, I discussed some potential concerns with OSS and how it is the organization's responsibility to catalog OSS...

Five Reasons Why E-Learning is the Way to Go

Have you ever attended a large-scale mandated corporate face-to-face training? I have personally experienced a few and they are not as engaging as the E-Learning training platforms that I've used. Usually, you have one or two time slots to choose from...

Are You Ready for CMMC?

Do you do work with the Department of Defense (DoD)? If so, are you preparing for the “CMMC?” If not, you might want to head on over hereand take a look at the draft cybersecurity document that’s on the cusp of being implemented.

Microservices: What They Are and What You Need to Know

As a security practitioner, part of the job is to keep up with the changes in technology. This is certainly no easy task as things are changing at breakneck speed. New architectural concepts, the rise of cloud, new data processing models, lots more data,...

Don't Just Throw Darts

Congratulations - you've made it to a point that most companies have not - you're actually going to be training your employees on cybersecurity!

It's Cybersecurity Awareness Month 2019

October is Cybersecurity Awareness Month and to help improve your state of cybersecurity, we are offering several resources to help your business stay safe from cyberattacks. To start, TechGuard is offering 15% off Security Awareness Training Solutions...

How You Can Better Manage Vulnerabilities

Vulnerability Management. How often do you scan your network for vulnerabilities? What does your process for remediating these vulnerabilities look like? If you’re like most companies, you might scan once a year with your yearly compliance penetration...

 


 

Read More Articles →