TechGuard Blog


Four Risks and Solutions When Using QR Codes

If you've been out to eat in the last year, there's a high chance you saw a virtual or touchless menu option offered at a restaurant. What you saw was likely a Quick Response, or QR, code, and despite their controversial history, they've become widely...

How to Talk to Your IT Admin About Compliance

Have you ever tried bringing up compliance with an IT Admin? It usually ends up in one of two ways. The first is that the administrator’s eyes will glaze over as they begrudgingly accept their fate to add yet another responsibility onto their already...

Why FERPA Isn’t Enough to Keep Student Data Safe

The new school year marks the end of summer and while some schools are returning to in person learning, the Delta Variant has many sticking to virtual classrooms. Over the last year and a half, we learned that the education industry, like many others,...

What You Should Know About CISA’s New Joint Cyber Defense Initiative

On August 5th, at the Black Hat USA conference, newly appointed director of the Cybersecurity and Infrastructure Security Agency (CISA), Jen Easterly, called for a partnership between the government and private sectors. Officially titled the Joint...

Awareness ≠ Behavior Change

Let’s face it: the term “Security Awareness Training” has most people’s eyes glazing over on sight. For some, those words even bring about memories of past failed attempts at shifting how employees view their role in security. They are often a stark...

Our Connected World Invites Attackers, Here’s How to Keep Them Out

Today people are always online no matter the time or place. This convenience is an essential part of doing business. Constant connection does come with a cost - increased risks for cyberattacks. In business, connectivity has become a necessity you...

Why Every SMB Needs a Cybersecurity Roadmap

Small and medium-sized businesses (SMBs) are at risk of experiencing a cyberattack now more than ever. In fact, SMBs are a top target of cybercriminals now that there are more remote workers, cloud services, and internet-connected devices than ever...

Stop Spam From Flooding Your Inbox

Spam – We all get it. We all hate it. It can flood our inboxes and cause us to miss important messages. We all know someone, or maybe you are someone who has 50,000 plus unopened emails on a personal account. That is often due to giving an email out...

How to Know If the Employee Training Program Is Working

Studies show that companies are spending a lot of time and money on employee training. So, we know that companies care about getting employees up to speed, but the real question is: "Is it working?" There are multiple ways to measure the effectiveness...

Don't Let Employees Fall Through the Cracks

Wouldn't it be nice if you could purchase a phishing email simulator and be good to go? Although phishing campaigns have high success rates in changing the behavior of most employees, you must decide how you will handle those few employees who keep...

Understanding the Difference Between Vulnerability Assessments and Penetration Tests

Being cybersecurity professionals, we hear companies stating time and time again that they’ve had a Penetration Test only to find out through more in-depth conversation they in fact had a Vulnerability Assessment. Why do so many companies get these...

Traveling Cyber Safe in 2021

The pandemic is not over, but we are heading in the right direction. More people are gaining access to vaccinations, and COVID restrictions have loosened up, which means we are starting to see airports fill up with travelers again. That's good news,...

1 2 3 4 5

 


 

Read More Articles →