USB Drop Attacks
As humans, most of us are curious to a fault. Picture an innocently curious businessman going about his day and picking up a USB drive he found on the ground …
As humans, most of us are curious to a fault. Picture an innocently curious businessman going about his day and picking up a USB drive he found on the ground …
Social engineering is a form of manipulation someone might use to get another person’s sensitive security information. It is important to know how to identify social engineering and be able …
Microsoft has released their passwordless option to users this past week. Multiple factors of authentication will always be your most secure login process. However, instead of the password being your …
Cyber.org believes K-12 cyber education is the key to solving the cyber workforce shortage. CYBER.ORG, the academic initiative of The Cyber Innovation Center, is a cybersecurity workforce development organization that …
The AARP knows that being scammed stinks and that the emotional aftermath can oftentimes be worse than the scam itself. Knowing this, they developed 2 free resources that anyone who …
The main point of this guide series is not whether you should pay the ransom or not; it’s how to handle Ransomware no matter your choice. We’ll make a case …
The Yes Tech team presents The Ransomware Serenity Prayer. Enjoy!
Do you have data backups? Have you tested your backups to make sure they’re good? Do you have a Disaster Recovery plan? Have you tested your Disaster Recovery plan? We …
The National Cybersecurity Alliance and the Identity Defined Security Alliance (IDSA), present the first Identity Management Day, an annual awareness event which will take place on the second Tuesday in …
On Thursday, March 11th the City of Covington found themselves to be one of about 30,000 U.S. organizations who fell victim to the same cyber-attack. The city of Covington uses …