Watch Out for Reply-Chain Phishing Attack

Watch Out for Reply-Chain Phishing Attack

  Phishing. You can’t read an article on cybersecurity without it coming up. That’s because phishing is still the number one delivery vehicle for cyberattacks. For example, a cybercriminal may want to steal employee login credentials. Or wish to...
BYOD: Bring Your Own Device-Placing limits

BYOD: Bring Your Own Device-Placing limits

Our recent blog talked about the data security concerns that BYOD can bring to your workplace. However, there is another factor that needs consideration before adopting BYOD. How much Bring Your Own can your IT department support? Supporting too many different...
Multi-factor Authentication Demystified

Multi-factor Authentication Demystified

You have probably come across the term multi-factor authentication of late. It is an IT buzzword today and is fast becoming one of the best practices of cybersecurity. What is Multi-factor Authentication? As fancy as the term sounds, multi-factor authentication (MFA)...