Top fallacies and facts about zero trust security

Given how zero trust security is getting a lot of attention these days, you may think it’s a new concept. But it was back in 2010 when John Kindervag of Forrester Research first coined the term “zero trust” to describe their security model, which had a simple rule: “Trust no one.

When passwords don’t pass muster: The best alternatives to passwords

You know the drill: you’ve just created an online account, and now you’re asked to come up with a strong password. Certain sites even have password guidelines and will judge the strength of your password: Use at least 12 characters! Use a variety of letters, numbers, punctuation, and special characters! Use upper- and lowercase for letters!

Aside from those, they have other rules you need to remember: Do not use real words found in a dictionary! Do not use real words spelled backwards! Never use your birthday, driver’s license number, street name, favorite color! Never use “password,” “123456789,” “1111111111,” “abc123,” and “qwerty” as passwords!

And so you freeze.

3 Reasons why your business should use a VPN

A virtual private network (VPN) adds security and privacy to public networks, such as wireless hotspots, by rerouting all traffic through a secure server. While VPNs are great for consumers, business-grade solutions offer additional security measures so employees are even more confident they can access the internet safely.

Here’s your essential checklist against cyberattacks

Cybercrime losses are continually increasing, either in cost or in number of accounts affected. In 2013, the global average cost of cybercrime was at $7.2 million. Five years later, it increased to $11.7 million. In 2018, three of the top 10 largest data breaches of all time happened, affecting around 750 million accounts.

5 Reasons why hackers are targeting schools

Schools are rarely known for holding huge amounts of financially valuable information in their vaults, such as credit card details. However, that doesn’t make them less of a target to hackers than many other organizations. In fact, cybercriminals are stepping up their attacks against educational institutions, as demonstrated by September’s ransomware attack on a school in Florida Keys.

Find out how you can get a functional backup and disaster recovery plan todayRead our FREE eBook
+