TechGuard Blog


Five Places You May Have Dropped the Ball on Security

It wasn't that long ago that businesses' largest concern was having a decent lock on their doors to secure the premises. It's obvious that we've come a long way and so have bad actors. Fast forward a bit and many businesses invested in email security...

Passwords, Lies and Webcam Recordings

Email content filters have come a long way in recent years. Tremendous strides have been made in protecting us from the never-ending wave of malware and malicious intent. However, cybercriminals (if nothing else) are very creative and not easily...

Business Email Compromise Scams are Through the Roof

Everyone is on the alert and it's for good reason. Just a week ago, the Feds indicted 80 people in a massive fraud conspiracy. U.S. Attorney Nick Hanna states, "We believe this is one of the largest cases of its kind in U.S. history." According to the...

I Was Going To Get To That

With new tools and technology constantly being introduced into the market, have you ever wondered why vulnerabilities that have been around for years just won't die? One big reason is PATCH MANAGEMENT.

Exploiting the Content Filter

Ever wonder how that phishing email slipped by your state-of-the-art mail defenses? These days hackers find it’s not enough just to fool users with URL manipulation techniques. In the past, successful phishing campaigns might have yielded hundreds of...

Identity Access Management and How it Applies to Security

IAM: Knowing your Roles. “Know your role!”, is a famous quote from professional wrestler, turned actor, Dwayne “The Rock” Johnson. How does this apply to Information Security? Well, sit back and let me explain how a small quote from a giant man can be...

Think Like a Hacker

You are probably familiar with the saying, "If you can't beat them, join them." The same philosophy applies to cybersecurity. To really get inside the mind of a hacker, you need to think like a hacker, otherwise known as "white hat" hacking. Malicious...

How to Determine the Cybersecurity Needs of Your Business

The Cybersecurity Cost Center Problem One of the most challenging aspects of working in cybersecurity is demonstrating value. Despite the breaches that dominate the news and the headlines surrounding ransomware wreaking havoc on organizations each day,...

Security Awareness Training as part of Onboarding New Hires

Often onboarding new hires includes a lot of administrative tasks often fulfilled by HR but there are quite a few important onboarding procedures that relate to security. There's plenty of reasons why security awareness training should be part of every...

Securing Your IoT Home

The Internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring...

Could a Phishing Email Get your Employees Fired?

Although most of us have heard plenty of times to watch out for business email compromise (BEC), often employees still feel tempted to click on the bait before they really think through the consequences. Even worse, as soon as they realize they should...

Practice What you Breach - Incident Response Plan Basics

Plan to fail instead of failing to plan According to a November 2018 Gallup poll, 71% say they frequently or occasionally fear that computer hackers will access their personal, credit card or financial information. The best way to control fear, is to...

 


 

Read More Articles →