TechGuard Blog


How to Get past the Password Problem

Passwords as a security measure are swiftly becoming obsolete as technology, and cybercrime advances. Weak passwords are too easy to hack, and strong passwords are too complicated to remember. Make sure you have a different password for every account...

Camera App Vulnerability Allows Hackers a Look at Your Private Information

What is the most un-nerving action hackers can do to your smartphone? Perhaps, hack into your camera and watch you as you go about your day? What about jack into your microphone and listen to everything you say in your daily meetings? Well, a series...

How You Can Reduce the Ransomware Spikes

According to CNN Business, there were 140 ransomware attacks to local governments, schools and hospitals from January 2019 through October. The increase in ransomware this year is likely connected to the increase in payouts. It makes perfect sense...

Open Source Software - Common Vulnerabilities

The proof, as they say, is in the pudding In a previous blog post I wrote about addressing concerns with Open Source Software (OSS). In that blog, I discussed some potential concerns with OSS and how it is the organization's responsibility to catalog...

Five Reasons Why E-Learning is the Way to Go

Have you ever attended a large-scale mandated corporate face-to-face training? I have personally experienced a few and they are not as engaging as the E-Learning training platforms that I've used. Usually, you have one or two time slots to choose from...

Are You Ready for CMMC?

Do you do work with the Department of Defense (DoD)? If so, are you preparing for the “CMMC?” If not, you might want to head on over here and take a look at the draft cybersecurity document that’s on the cusp of being implemented.

Microservices: What They Are and What You Need to Know

As a security practitioner, part of the job is to keep up with the changes in technology. This is certainly no easy task as things are changing at breakneck speed. New architectural concepts, the rise of cloud, new data processing models, lots more...

Don't Just Throw Darts

Congratulations - you've made it to a point that most companies have not - you're actually going to be training your employees on cybersecurity!

It's Cybersecurity Awareness Month 2019

October is Cybersecurity Awareness Month and to help improve your state of cybersecurity, we are offering several resources to help your business stay safe from cyberattacks. To start, TechGuard is offering 15% off Security Awareness Training...

How You Can Better Manage Vulnerabilities

Vulnerability Management. How often do you scan your network for vulnerabilities? What does your process for remediating these vulnerabilities look like? If you’re like most companies, you might scan once a year with your yearly compliance penetration...

Medical Devices are Vulnerable to Cyberattacks

It's not easy to place a recall on implanted medical devices. Imagine what that could look like for someone with a pacemaker. Consider the consequences of a vulnerability that allows a malicious actor to take remote control over a device like this....

Compliance: You Actually Need It

One of the first steps to start your security program is finding out where you are the most vulnerable. Usually, the best way to do this is using a process or a tool that can track the risks associated with each individual asset that your business...

1 ...
3 4 5 6 7

 


 

Read More Articles →