• Skip to main content
  • Skip to footer
Menu
  • Home
  • About Us
  • Solutions & Services
    • Security Governance
    • Network Security 
    • Cloud Security 
  • Compliance
  • Sectors
  • Blog
  • Contact

Cyber security tips

Jul 26 2020

Cybercrime during COVID-19: 5 things every CISO needs to know

cybercrime-during-covid-19

Due to COVID-19, most countries worldwide are facing economic recessions and a rise in online fraud attempts. The recession due to COVID-19 may drive up cybercrime by 35%, according to one estimate. It is worth noting that during the 2008 recession, countries like Brazil and Spain suffered economic downturns that led to a rise in cybercrimes.  It is difficult to predict the increase in … [Read more...] about Cybercrime during COVID-19: 5 things every CISO needs to know

Written by kamran · Categorized: Cyber security threats, Cyber security tips, E-Commerce cyber security, Ransomware · Tagged: cybercrime, cybercrime during corona virus, cybercrime during covid-19, cybercrime during pandemic

Feb 07 2020

5 steps to avoid credential dumping attacks

healthcare data security

Credential dumping is a technique used by cybercriminals to gain access to a network. They enter the workstation through phishing and controls through the typical way the admin uses and monitors the network to find exposed credentials. The cybercriminals find out organization vulnerabilities which lead them to credential dumping. Given are few ways to identify the vulnerabilities to avoid … [Read more...] about 5 steps to avoid credential dumping attacks

Written by kamran · Categorized: Cyber security tips

Jan 28 2020

Two-factor authentication explained

What is two-factor authentication? Two-factor authentication is a method of providing access to an online account. It requires two different types of information to get access to information or system.  It is a way of convincing the computer system that you are the one who has the right to access to the system or information. The common authentication method used is the username and … [Read more...] about Two-factor authentication explained

Written by kamran · Categorized: Cyber security news, Cyber security tips

Jan 27 2020

Why you need both authorization and authentication

system security

Authorization is a small portion of the access control equation, organizations the authentication steps to effectively manage access to sensitive data. Authentication is the process of validating the identity of authorized users trying to get access to an application, API, microservices and other data. Authorization is permitting an authenticated user the permission to perform a given action on … [Read more...] about Why you need both authorization and authentication

Written by kamran · Categorized: Cyber security tips

Jan 12 2020

04 ways to improve your security posture in 2020

In 2019 thousands of data breaches have been exposed, but still, ransomware and malware are looming as a threat and the cybercriminals are adopting more sophisticated ways and techniques to attack. Corporations and government organizations are likely to face more challenges. The challenges in 2020 are growing and if you are determined to keep your organization safe and achieve a stronger … [Read more...] about 04 ways to improve your security posture in 2020

Written by kamran · Categorized: Cyber security news, Cyber security tips

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 52
  • Page 53
  • Page 54
  • Page 55
  • Page 56
  • Interim pages omitted …
  • Page 74
  • Go to Next Page »

Footer

Infoguard Cyber Security

San Jose Office
333 W. Santa Clara Street
Suite 920
San Jose, CA 95113
Ph: (855) 444-6004

Irvine Office
19800 MacArthur Blvd.
Suite 300
Irvine, CA 92612

Recent Posts

  • Your Law Firm Could Be Next — Are You Protected?
  • Litigation, Logins, Breach Response & More: A Lawyer’s Cyber Survival Guide
  • Massive Surge in Healthcare Cyber Attacks…Ransomware, Radiology Data Breach, and More

Get Social

  • LinkedIn
© 2026 INFOGUARD. All Rights Reserved.
Linkedin-in
Menu
  • Home
  • About Us
  • Blog
  • Compliance Services
  • Contact
  • Sectors
Menu
  • Home
  • About Us
  • Blog
  • Compliance Services
  • Contact
  • Sectors
  • Privacy Policy
  • Terms of Use
  • Acceptable Use