dcsimg

How to Set Up Windows Defender Custom and Scheduled Scans

Windows Defender comes with Windows 10 is a great way to keep your computer protected from malware. … [Read more...]

Rogue Device Detection And Prevention

How do we protect ourselves from rogue devices? What are the current solutions? … [Read more...]

What is MD5?

MD5 is still being used today as a hash function even though it has been exploited for years. In this article, we discuss what MD5 is; it's history, and how it is used today.  … [Read more...]

6 Ways for Financial Institutions to Avoid Wire Fraud

Wire fraud is a federal offense under U.S. law and refers to fraud committed using electronic communications, such as telephone or computer. Unfortunately for financial institutions, wire fraud is on the increase, and not just in the U.S. … [Read more...]

Top 7 Data Security Concerns for Lawyers

Relative to the sensitivity of the data that they protect, law firms have some of the laxest information security that you can find. … [Read more...]

4 Ways Colleges and Universities Are Failing at Cybersecurity

Bursting with personal information and financial details for students and employees, as well as valuable research information that could result in financial loss if stolen, Universities are seen as having lax systems and an abundance of reward. … [Read more...]

How a Pandemic Started a Trend Called Zoombombing

Zoom has seen hyper-growth during what IT teams are calling the "new normal." But that fame comes with a cost--the attention of hackers and security pros. … [Read more...]

UNIX Has Always Been More Secure Than Windows

By default, UNIX-based systems are inherently more secure than the Windows operating system. In this article, we describe precisely why that is. … [Read more...]

Podcast: How IT Can Enable a Remote Workforce

Jason Rader from Insight Enterprises discusses the challenges IT teams are facing during the pandemic, such as Shadow IT and data security issues. … [Read more...]

HTTPS and A Padlock Does Not Mean A Website is Secure

Online shoppers are often encouraged to ensure that their chosen online stores are 'secure', that the 's' in HTTPS is visible, and that the web browser displays a lock symbol. Propagating these visible indicators as confirmation of website security is not only irresponsible; it's also dangerous. … [Read more...]