• Skip to main content
  • Skip to footer
Menu
  • Home
  • About Us
  • Solutions & Services
    • Security Governance
    • Network Security 
    • Cloud Security 
  • Compliance
  • Sectors
  • Blog
  • Contact

Cyber security news

Feb 01 2020

Coronavirus Used to Spread Malware

cyber security outsource

Cybercriminals are using the fear of coronavirus break across the globe to spread malware through emails. They are offering preventive measures against the real-time virus. The emails come with an attachment that contains malware and promises to provide details on preventative measures against the coronavirus. It was first detected by IBMX-Force threat intelligence in Japan. It is targeting the … [Read more...] about Coronavirus Used to Spread Malware

Written by kamran · Categorized: Cyber security news

Jan 28 2020

Two-factor authentication explained

What is two-factor authentication? Two-factor authentication is a method of providing access to an online account. It requires two different types of information to get access to information or system.  It is a way of convincing the computer system that you are the one who has the right to access to the system or information. The common authentication method used is the username and … [Read more...] about Two-factor authentication explained

Written by kamran · Categorized: Cyber security news, Cyber security tips

Jan 19 2020

Use of OSINT tools for security and their functions

How OSINT is used in security OSINT stands for open-source intelligence. The OSINT tools are used in the investigation phase to collect information about their possible target. The OSINT tools use artificial intelligence features to find sensitive data around the web.  The tactics used for OSINT spycraft can be used for cybersecurity. Large companies are using public-facing infrastructure to … [Read more...] about Use of OSINT tools for security and their functions

Written by kamran · Categorized: Cyber security news

Jan 19 2020

What is Information Security? Definition, Principles and Policies

Definition of Information Security The protection of personal data from unauthorized access and changes during storage or transmission is the main goal of information security practices. These practices are put in place to ensure the safety of sensitive information. The purpose of information security is to safeguard private, sensitive, and personal data from unauthorized individuals through the … [Read more...] about What is Information Security? Definition, Principles and Policies

Written by kamran · Categorized: Cyber security news · Tagged: cybersecurity, information security, network security

Jan 12 2020

04 ways to improve your security posture in 2020

In 2019 thousands of data breaches have been exposed, but still, ransomware and malware are looming as a threat and the cybercriminals are adopting more sophisticated ways and techniques to attack. Corporations and government organizations are likely to face more challenges. The challenges in 2020 are growing and if you are determined to keep your organization safe and achieve a stronger … [Read more...] about 04 ways to improve your security posture in 2020

Written by kamran · Categorized: Cyber security news, Cyber security tips

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 13
  • Page 14
  • Page 15
  • Page 16
  • Page 17
  • Interim pages omitted …
  • Page 22
  • Go to Next Page »

Footer

Infoguard Cyber Security

San Jose Office
333 W. Santa Clara Street
Suite 920
San Jose, CA 95113
Ph: (855) 444-6004

Irvine Office
19800 MacArthur Blvd.
Suite 300
Irvine, CA 92612

Recent Posts

  • Your Law Firm Could Be Next — Are You Protected?
  • Litigation, Logins, Breach Response & More: A Lawyer’s Cyber Survival Guide
  • Massive Surge in Healthcare Cyber Attacks…Ransomware, Radiology Data Breach, and More

Get Social

  • LinkedIn
© 2026 INFOGUARD. All Rights Reserved.
Linkedin-in
Menu
  • Home
  • About Us
  • Blog
  • Compliance Services
  • Contact
  • Sectors
Menu
  • Home
  • About Us
  • Blog
  • Compliance Services
  • Contact
  • Sectors
  • Privacy Policy
  • Terms of Use
  • Acceptable Use