Free VPNs and their Hidden Dangers

Free VPNs and their Hidden Dangers

Are you aware that the rise in global VPN usage has skyrocketed? The reasons are clear as day: Virtual Private Networks offer increased security, anonymity and allow access to geo-restricted content online. But here’s the million-dollar question: Are all VPNs...
Watch Out for Reply-Chain Phishing Attack

Watch Out for Reply-Chain Phishing Attack

  Phishing. You can’t read an article on cybersecurity without it coming up. That’s because phishing is still the number one delivery vehicle for cyberattacks. For example, a cybercriminal may want to steal employee login credentials. Or wish to...
BYOD: Bring Your Own Device-Placing limits

BYOD: Bring Your Own Device-Placing limits

Our recent blog talked about the data security concerns that BYOD can bring to your workplace. However, there is another factor that needs consideration before adopting BYOD. How much Bring Your Own can your IT department support? Supporting too many different...