Still running Windows 7 or Windows Server 2008? Take these steps to minimize your risk.
Start the new year off by eliminating common paths for attackers to breach your network.
Prevent Windows admin credentials from being exposed in cleartext with this tip.
Follow these steps to ensure your multi-factor authentication for Office 365 is effective.
The new Apple Card, the battle for cryptocurrency dominance, cybersecurity skills shortage – just a few of the stories that made headlines in 2019. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp discuss the top tech stories of the year.
This new Microsoft 365 feature can help you stay in compliance with regulations like GDPR and better protect data.
Attackers often take advantage of the holidays to launch attacks. Use these Microsoft settings to deter them.
Follow these steps to protect your websites at the server and workstation.
Make your own disaster checklist and recovery toolkit before trouble happens.
Healthcare organizations are one of the most targeted verticals when it comes to cyberattacks. While those organizations must work to secure patients' sensitive data, it can also be helpful to analyze that data to improve patient outcomes. Jason James, CIO of Net Health, joins Juliet to discuss why attackers target healthcare organizations, Google's Project Nightingale and what it means for a tech giant to have access to the medical data of millions of people.
Use these techniques to limit attackers’ ability to compromise systems and websites.