Cybersecurity


5 Common Phishing Attacks and How To Protect Yourself Against Them

5 Common Phishing Attacks and How To Protect Yourself Against Them

Phishing scams continues to be a widespread problem for businesses and individuals alike. But there are several ways to recognize that you could be getting scammed.

Report: Facebook Database Found Online Exposed Phone Numbers of Millions

Report: Facebook Database Found Online Exposed Phone Numbers of Millions

A database that was left without password protection was discovered by a security researcher, who said 419 million records of Facebook user phone numbers were exposed.

Democratic National Committee Rejects Plans To Hold ‘Virtual Caucuses’ in Iowa and Nevada, Citing Security Concerns

Democratic National Committee Rejects Plans To Hold ‘Virtual Caucuses’ in Iowa and Nevada, Citing Security Concerns

Facing criticism over low voter turnout and barriers to caucusing, party officials planned for remote caucuses in 2020. But the national Democratic Party said the methods would expose the process to high cybersecurity risks.

3 Major Internet Privacy Issues and How to Avoid Them

3 Major Internet Privacy Issues and How to Avoid Them

Information mishandling, snooping and location tracking are often the ways in which users find their privacy violated online.

Deploying IoT Devices

Deploying IoT Devices

The number and breadth of devices that make up the Internet of Things (IoT) continues to grow rapidly, with everything from kitchen appliances to video surveillance and access control systems offering the ability to connect to a network.

Security by Design

Security by Design

We know by now that there is an abundance of business advantages in the cloud — it’s agile and cost-efficient, and, with little to no hardware maintenance, it’s easier to update and perform maintenance on than traditional on-site servers.

5 Questions for Your Cloud Provider

5 Questions for Your Cloud Provider

Do you want the real bottom line in providing cloud services for video, access control and other integrated services?

Path to the Future

Path to the Future

Security professionals face many challenges in selecting video surveillance systems that address their unique needs.



voting booth in 2016

Government Officials Worry That Ransomware Attacks Could Derail 2020 Elections

The Department of Homeland Security is preparing to launch an education program on the potential of ransomware attacks targeting voter databases, some of which were compromised by Russian hackers in 2016.

cyber attack written on newspaper

Report: Insurance Companies Are Exacerbating Rise in Ransomware Attacks

A ProPublica investigation found that the decision by insurers to pay hackers instead of encouraging victims to recover files by themselves is helping fuel a surge in ransomware.

department of homeland security flag

Federal Cybersecurity Agency Prioritizes Addressing Chinese Threats, Improving Election Security

The leader of the Cybersecurity and Infrastructure Agency, which works within DHS, is concerned primarily with risk management, Chinese threats to supply chains and election security.

department of justice

Justice Department Indicts 80 People in Massive Online Fraud and Money Laundering Scheme

Two Nigerian citizens are accused of leading a massive fraud scheme that transferred at least $6 million in fraudulently-obtained funds, much of whom was taken from elderly people.

laptop cybersecurity

Five Surprising Trends in Cybersecurity

The impact of GDPR, the increasing number of issues with shadow IT and the more advanced solutions for IoT devices are among the most surprising trends.

medical devices

Healthcare Industry Facing Growing Range of Cyber Threats From Hackers, Foreign Countries

A new report predicts a new frontier of cyber attacks for healthcare organizations, including ransomware, international espionage and the hacking of biomedical devices.

computer keyboard

With 4.1 Billion Records Exposed in Six Months, 2019 Is On Course To Be Record Year For Data Breaches

Only eight breaches were responsible for the exposure of 3.2 billion records in the first half of the year, according to new research.

texas capitol building

Ransomware Attacks Hit 23 Texas Towns, Prompting Statewide Response

The state suspects that the attack, which took place Friday morning and targeted small local governments, was coordinated by “one single threat actor.”

open source vulnerability hacking

The Dangers of Open-Source Vulnerabilities, and What You Can Do About It

Neglecting basic security practices exposes companies to long-standing security threats.

capital one building

Alleged Capital One Hacker Stole From More Than 30 Other Organizations, Prosecutors Say

In a search of Paige Thompson’s home, federal agents found servers holding stolen data from other companies and an “arsenal of weapons” belonging to her roommate.

DSLR Cameras Are Susceptible to Ransomware Attacks, New Research Finds

DSLR Cameras Are Susceptible to Ransomware Attacks, New Research Finds

Cameras could be high-priority targets because owners are more likely to pay to get their valuable photos back, researchers said.

secure tablet

How Deception Technology Can Help You Detect Threats Early

Deploying automated decoys can help protect your network and reduce IT costs.

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • Spaces4Learning
  • Campus Security & Life Safety