remote-access-software-e1516348545259

Hacking via Remote Access Software?

Hackers typically sneak remotely into the networks of their victims by setting up phishing scams and duping users into downloading malware-ridden files, which are then executed to commence a cyberattack like ransomware. They may also look for vulnerabilities in computer systems to attempt to get into a network. Both the WannaCry and NotPetya attacks, for example, were successful beca ...

holiday-season-cybercrimes-e1510897242395

The Different Types of Cybercrimes This Holiday Season

It’s that time of year again. With October wrapped up and November in full swing, we are entering into the holiday season where cybercrimes are at an all-time peak. And even if you aren’t purchasing goods and services on the Internet, anyone can still fall victim to cybercrime. Sometimes, however, Internet users may not be aware of the different types of cybercrimes t ...

bug-bounty-programs-e1518156198401

The Downsides to Bug Bounty Programs

Many people are familiar with bug bounty programs. They are designed to test the security of a company’s computer systems by crowdsourcing talent from all around the world to report bugs, especially those with critical vulnerabilities. In a way, bug bounty programs make the services and software we use much safer, but that’s just on the surface. While the rewards ...

PCI-compliance-online-payment-standard-e1510207032623

Top 5 PCI Compliance FAQs

PCI (payment card industry) compliance may not be an expression you hear often as a business owner. However, non-compliance has noteworthy impact to the level of risk your business assumes in payment processing if you accept credit and debit cards from customers as a form of payment. Despite the media headlines that tend to focus on significant data breaches that impact major ret ...