TechGuard Blog


UPnP Devices at Risk from New Vulnerability

Universal Plug and Play (UPnP) has been a security nightmare since its inception over a decade ago. This technology is generally found in consumer-grade networked devices and allows them to discover other UPnP devices automatically on the network to...

A Deeper Look Into “Zero Trust” Security Strategy

What exactly is a Zero Trust security strategy? In general, this strategy simply means that not one person is trusted by default to access your secured network – no matter how high up they may be in the company – secured verification is required 24/7...

Newest Player in the Ransomware Game, Netwalker, Targets Universities

Over the past few weeks, there have been attacks carried out against universities in the united states where the attackers have been successful in stealing unencrypted data and then encrypting the university computers for ransom. The data taken from...

Back to the Basics: Security 101

Over the past few months, there has been much talk about COVID-19 and what it means for businesses with employees working from home. Today, I thought I would change it up and get back to the basics of cybersecurity to talk about a type of attack that...

How to Create a Work Culture of Holistic Risk Awareness

We’ve all been there – or most likely have been – on the receiving end of that annual (or semi-annual) email reminder with the subject line “URGENT: Mandatory Security Training Module.” Most employees may not even bother opening it, but that’s where...

Working Remotely? Beware of These Top Three Online Threats

We’ve been warning our readers of recent, emerging threats since the beginning of the COVID-19 pandemic – and we won’t stop. The cybersecurity risk level has skyrocketed while cybercriminals are leveraging on all things COVID-related. Hackers are...

Business Security in a COVID World. Now What?

On May 1st, President Trump signed a state of the emergency order that declares foreign cybersecurity threats to the electrical system a national emergency. Shortly afterward on May 15th, a cyber attack was reported in the U.K. National Market....

Changing Work Environments - How Does Your Security Awareness and Training Program Measure Up?

A high percentage of companies and employees have been dealing with it – changing work environments due to COVID-19. Since March, most of us have probably been stationed at home or sheltering somewhere safe as many businesses and offices have closed...

Building Your Primary Defense Strategy Through a Security Awareness Program

How should I start? The question going through most business leaders and policymaker's minds, is often, “Where do I start?” Creating a solid plan and making it as extensible to your future growth as possible is usually the best approach. The first...

Here, Phishy Phishy: Don’t Get Hooked by Phishing Emails

We all know what phishing emails are, correct? If not, we’re here to break it down for you. Simply put, phishing emails are hacking tactics that are produced by cybercriminals to trick you into opening, downloading or clicking on an infected link via...

Social Media: A Cybercriminal’s Playground

We all probably have some form of social media today – whether it be Facebook, Twitter, LinkedIn, Instagram – you name it. A large percentage of individuals have accounts with all these social media avenues, while others have chosen to stay off any...

Insider Threats Pose an Even Greater Risk During the COVID Crisis

Security Magazine reported on April 21, 2020, that, According to the Department of Homeland Security, insider threats often result in theft or destruction of data or the compromise of networks, communications or other information technology...

1 ...
3 4 5 6 7

 


 

Read More Articles →