TechGuard Blog


CCPA Compliance and What This Means for You

On June 28th, 2018, California signed a new law called the California consumer privacy act (CCPA), which went into effect on January 1st, 2020. On July 1st, 2020 this law went into its enforcement phase. What this entails is that California's Attorney...

Time’s Up, TikTok: The Hidden Security Risks

I’m sure you’ve all heard of the social media app, TikTok, by now, yeah? Even if you don’t have the app on your phone or you don’t know much about it, you’ve probably heard of others using it or you’ve seen the videos popping up left and right on your...

The Online Youth: How Risk-Aware Are They?

In the past, this article has been more technically focused. For this article, I decided to take a different approach. In the IT Security field, we stay pretty plugged into the technical community. Most of us have our favorite articles or publication...

An Apple a Day Keeps the Hackers Away

In recent weeks, Apple has announced its bold new security move that will have a positive security impact on everyone. This new security move will be changing how we access our browser and will essentially boost security for all its users – which is...

Staying One Step Ahead of Mobile Security Threats

What’s one of the first things you do when you wake up? A high percentage of individuals will answer “check my phone, “or “check my email,” which is inevitably linked to their mobile device anyway. We get it – it’s easy, and it’s way more convenient than...

UPnP Devices at Risk from New Vulnerability

Universal Plug and Play (UPnP) has been a security nightmare since its inception over a decade ago. This technology is generally found in consumer-grade networked devices and allows them to discover other UPnP devices automatically on the network to...

A Deeper Look Into “Zero Trust” Security Strategy

What exactly is a Zero Trust security strategy? In general, this strategy simply means that not one person is trusted by default to access your secured network – no matter how high up they may be in the company – secured verification is required 24/7 in...

Newest Player in the Ransomware Game, Netwalker, Targets Universities

Over the past few weeks, there have been attacks carried out against universities in the united states where the attackers have been successful in stealing unencrypted data and then encrypting the university computers for ransom. The data taken from...

Back to the Basics: Security 101

Over the past few months, there has been much talk about COVID-19 and what it means for businesses with employees working from home. Today, I thought I would change it up and get back to the basics of cybersecurity to talk about a type of attack that is...

How to Create a Work Culture of Holistic Risk Awareness

We’ve all been there – or most likely have been – on the receiving end of that annual (or semi-annual) email reminder with the subject line “URGENT: Mandatory Security Training Module.” Most employees may not even bother opening it, but that’s where we...

Working Remotely? Beware of These Top Three Online Threats

We’ve been warning our readers of recent, emerging threats since the beginning of the COVID-19 pandemic – and we won’t stop. The cybersecurity risk level has skyrocketed while cybercriminals are leveraging on all things COVID-related. Hackers are smart –...

Business Security in a COVID World. Now What?

On May 1st, President Trump signed a state of the emergency order that declares foreign cybersecurity threats to the electrical system a national emergency. Shortly afterward on May 15th, a cyber attack was reported in the U.K. National Market....

 


 

Read More Articles →