Cybersecurity - Page 28 of 31 - Business2Community
  • Home
  • Category: Cybersecurity

Cybersecurity

Cyber Security: Who Cares? and What Happens Next?

In recent years, digital transformation has become a key topic in the business world. However, many of these discussions often…

Jay Leonard
November 17, 2016
Cybersecurity

Recovering from a Data Breach: 3 Steps to Combat Vulnerabilities

Have you ever encountered a data breach which has exposed the vulnerabilities of your entrepreneurial setup? Are you worried about…

James Spillane
November 15, 2016
Cybersecurity

7 Shocking Statistics on Small Business Data Theft

According to the 2016 Internet Security Threat Report from Symantec, total online security breaches are up by 2 percent since…

Connor Brooke
November 9, 2016
Cybersecurity

Security Strategies You Can Use to Protect Your Small Business from Cyber Attackers

As business owners, we often get so caught up in the daily operations of our companies that we overlook the…

Connor Brooke
November 5, 2016
Cybersecurity

Payment Trends in 2017: Fighting Fraud Using Machines

Machine learning can be used in many ways today and scientists are just limited by their imagination. Can the power…

Jay Leonard
October 31, 2016
Cybersecurity

Voter Registration Systems Targeted in Latest Breach

After the State Board of Elections was attacked in Arizona and Illinois in two separate data breaches, the FBI is…

Connor Brooke
September 20, 2016
Cybersecurity

Cyberattack Security: How Safe Is Your Company?

Have you thought about your company’s digital security lately? Whether your business is large or small, you should always be…

Connor Brooke
September 15, 2016
Cybersecurity

E-commerce Stores as Ransomware Victims – Pay Up or Not?

A few days ago, Trend Micro released a report on the threat or ransomware for the first half of 2016.…

Jay Leonard
August 24, 2016
Cybersecurity

Top 6 Funniest And Most Overused Images Of Hackers

You've likely seen a big increase in articles about security breaches in recent years. That's not great news, but the…

James Spillane
August 18, 2016
Cybersecurity

The Pros & Cons of BYOD

For a modern-day workplace, a bring-your-own-device (BYOD) policy is becoming commonplace. Since many organizations are now assigning corporate devices, such…

Connor Brooke
July 19, 2016
Cybersecurity

What is Contextual Authentication?

Lots of new buzzwords appear every day in the identity management and anomaly detection space, one of which is 'contextual…

James Spillane
July 7, 2016
Cybersecurity

Stay Informed, Sign Up for Our Exclusive Newsletter!

By signing up you agree that you have read our privacy policy.
You’re now signed up!