Understanding the key findings of IBM’s Cost of a Data Breach Report 2020.
Some organizations require that any software installed on a network device or any hardware connected to the network be approved through their IT department. When users install software, apps, or… Read more Shadow IT →
Last week, Twitter made national news when unusual tweets were posted from high profile accounts. Had it been hacked? Accounts from Joe Biden, Elon Musk, Bill Gates, Apple and others… Read more The Twitter Hack and Insider Threats →
The world is on alert over the spread of Coronavirus. People are stressed, making plans to protect themselves by stocking up on masks and food, rearranging travel plans, and practicing… Read more Scammers and Current Events →