LabCorp is facing a network security breach that forced the North Carolina-based laboratory diagnostics firm to shut down its IT network, possibly placing PHI of millions of people at risk.
Whether you are a customer that is looking for what to expect in security scans of your network or you are a technician that wants to scan a customer's network. We will be reviewing what you should be doing. When should you have or suggest a Penetration Tests on a network or if you need one as a customer? Security is a hot button as well as being a nebulous term. External Scan What do you need? You need to have an external…
Small business network security has become even more important in recent years and your data is valuable. We'll show you how to protect your business and your customers from being hacked
Learn what Network Security is in addition to the top tools and techniques you need to know to keep your data safe!
If you're sticking with legacy vendors because you're worried about open source software security, let this blog post put your mind at ease!
IT supplier Brother International shares five of the most common internet-of-things security errors it sees among buyers of its printers and multi-function devices.
Although machine learning can benefit security strategies, the technology can also be used by hackers. Read about the advantages and disadvantages of machine learning in network security.
Smart Technology can actually be a hindrance to your business’ cybersecurity initiatives. Today, we’ll explain how.
Discover the top 3 benefits of network security services and why these services can help your company.
The router and firewall is a critical piece of equipment in your network. It connects you to the outside world while also acting as your first line of defence against intruders. If your firewall ge…
Network security is an essential part of any company. Creating a comprehensive IT strategy and implementing it correctly is critical to keeping you safe.
Does your social media strategy include security measures? HootSuite CEO Ryan Holmes explains some of the risks companies face on social media and how you can protect yourself.
A German institute by the name of AV-TEST has tested out various antiviruses so that you can choose one that would be most effective.
Perch uses advanced analytics and correlation to detect threats and generate automated notifications 24 hours a day, 365 days a year.
No system can be entirely "hack proof" but browser security tests and network safeguards can make your set-up more robust. Use these free tools to identify "weak spots" in your home network.
As companies scramble to patch a bug that exposed much of the Internet for two years, you can protect yourself by practicing some good Web hygiene.
Have you ever felt the underlying notion that someone isn't being completely honest with you? Who hasn't! These sneaky people think they can be smooth and lie
Data breaches have been in the news a lot lately. We take a look at why they occur and what they can cost your company.
While data breaches of large companies and government agencies usually make the news, small businesses are actually more vulnerable to hacking. Having an IT support team ...
John Southrey, director of consulting services at TMLT, describes the costs - both direct and indirect - of a cyber data breach.
How you spend your time, and with whom, have a lot to do with determining the opportunities that come your way.