Cybersecurity and Data Privacy Blog2019-02-06T10:13:09-07:00

Cybersecurity and Data Privacy Blog

Understanding modern cybersecurity anatomy

By |January 18th, 2019|

The threat landscape we see today is vastly different and infinitely more sophisticated. The days of protecting yourself from bad actors using a single antivirus solution are now behind us. Fileless network protection is a key element to device security and an important part of the layered security strategy.

Cryptocurrency Mining Protection

By |March 7th, 2018|

Cryptocurrency mining is the latest trend in hacking (also called Cryptojacking) where code is injected into web sites and is used to hijack the users’ CPU to mine cryptocurrency. This has been driven by a boom in the value of cryptocoins in general and is a way for hackers to make money.