Tag: passwords

improve password security by not using passwords on post it notes, like this picture.

42% of Companies Must Improve Password Security. Here’s How to Do It.

by Amelia Paro

If you think you don't have a password security problem, you're wrong. Read these scary statistics and weep - then do something about it.

Read More

These Bad Passwords Make Every Day Groundhog Day for IT Teams

by ID Agent

Every day is Groundhog Day for IT Teams when people use or recycle these bad passwords, but they just keep doing it. Here's how to stop that.

Read More
should you diclose a data breach represented by the words "hacking detected" in red on a blue and white touchscreen

Should Your Business Publicly Disclose a Data Breach?

by Amelia Paro

Should you disclose a data breach? These statistics tell you the truth about the positives & negatives of disclosing a data breach.

Read More
facts about cybersecurity in 2020 and looking ahead to 2021 represented by an electronic eye on a blue background with computer code.

3 Big Facts About Cybersecurity in 2020 to Remember for 2021

by Matt Solomon

As you're making your 2021 cybersecurity plan, don't forget to consider these 3 essential facts about cybersecurity in 2020.

Read More
improve password security with these 3 tools. Image shows a white password login box on a blue screen

Improve Password Security in 3 Steps

by Jeremy Malin

Improve password security with these 3 tools to help you spot bad passwords, make good ones & keep cybercriminals out of your business!

Read More
third party password compromise represented by the word "password" glowing in green inside lines of binary code in shades of blue

Is Third Party Password Compromise Your Achilles Heel?

by Jeremy Malin

Third party password compromise is a top risk as Dark Web data like password lists grows. Here's how to protect your business.

Read More
supply chain risk represented by a world map in blute digitized with pathways showing business relationships

10 Facts About Supply Chain Risk You Need to See

by ID Agent

You're paying attention to cybersecurity best practices but are your suppliers and service providers? Here's how to mitigate supply chain risk from sloppy third party cybersecurity dangers.

Read More
election2020cybersecurity represented by a woman with a smartphone using multifactor authentication to log in to a laptop

3 Crash Courses in Cybersecurity for MSPs

by ID Agent

MSPS: Do you feel like you need a quick refresher course in some of today's biggest threats? Here are 3 :crash courses" in cybersecurity to get you up to speed fast!

Read More
4lessonslearnedfromcybersecurity and COVID-19 represented by a red COVID-19 molecule floating past a blue padlock on a computer screen

Cybersecurity and COVID-19: 4 Lessons Learned

by Kevin Lancaster

COVID-19 brought unexpected security issues to the table. Take a look at these 4 lessons learned from cybersecurity and COVID-19 to be ready for the next big cybersecurity challenge.

Read More
social media is a data breach risk represented by a phone schowing social media icons

3 Ways That Social Media is a Data Breach Risk – and How to Fight Back

by Kevin Lancaster

Social media is a data breach risk- and a must-have for today's companies. Here are 3 threats posed by social media and how to mitigate them.

Read More