top of page
Search
echoudhury77
- May 22, 2020
- 1 min
Take These 3 Steps to Protect Your Data from COVID-19 Scams
Coronavirus (COVID-19) isn’t just a growing threat to public health – it’s also a growing threat to your company’s cybersecurity. From...
17 views0 comments
echoudhury77
- Feb 19, 2020
- 1 min
Cyber Insurance. For Free.
We believe that your next-generation endpoint and infrastructure protection solution should give you complete confidence that your...
24 views0 comments
echoudhury77
- Feb 19, 2020
- 1 min
ZERO Ransomware Infections
Hardly a week goes by when we don't hear about a business or an organization that suffered an attack by bad actors who infiltrated their...
12 views0 comments
echoudhury77
- Feb 19, 2020
- 3 min
The Insider Threat to Schools
High schools, for the most part, are insecure by nature, especially from an insider threat. If a student really wanted to hack a school’s...
12 views0 comments
echoudhury77
- Dec 23, 2019
- 1 min
What your Devices know about you
What do your devices know about you
30 views0 comments
echoudhury77
- Dec 19, 2019
- 2 min
The Wangiri Scam
It seemed odd to me that a type of telephone scam that's been around for a while and raises it's head during the holidays would be called...
27 views0 comments
echoudhury77
- Dec 19, 2019
- 1 min
Yes, Macy's and Dick's sell your PII
Did you know... That when you shop at stores like Macy's and Dick's Sporting Goods, these retailers SELL your information (like your...
26 views0 comments
echoudhury77
- Nov 21, 2019
- 2 min
Get less tracked by Google
It's widely known and recognized that if you use any products like Chrome, Android, Gmail, YouTube, etc., Google goes to great lengths to...
19 views0 comments
echoudhury77
- Nov 15, 2019
- 4 min
Dark Web vs Deep Web
Just about everyone's heard of the “dark web” by now. Most think it sounds ominous and mysterious, and it can be. Let's shed some light...
23 views0 comments
echoudhury77
- Nov 12, 2019
- 2 min
Hackers love your servers
3 Reasons hackers love your servers
20 views0 comments
echoudhury77
- Nov 11, 2019
- 2 min
Falling Down: Healthcare Information Security.
This post is courtesy of a guest writer with decades of experience in public and private healthcare. As a BSN and RN for over 20 years, I...
21 views0 comments
echoudhury77
- Aug 22, 2019
- 1 min
What is...a BEC Attack?
A BEC (or Business Email Compromise) attack occurs when cyber criminals use social engineering combined with phishing and spear-phishing...
66 views0 comments
echoudhury77
- Aug 14, 2019
- 2 min
Do you want to Detect or Prevent?
Do you want to just detect threat actors if they try to intrude in your network, or do you want to prevent them from even trying?
21 views0 comments
echoudhury77
- Jul 5, 2019
- 4 min
Protecting your Privacy
Protecting your privacy in Windows 10.
24 views0 comments
echoudhury77
- Jun 30, 2019
- 2 min
How Ransomware Strikes
We predicted in December 2018 about the rise of malware in 2019, especially ransomware. We based our predictions on aggregated threat...
19 views0 comments
echoudhury77
- Jun 25, 2019
- 2 min
The Credit Card Code
Credit cards, or plastic money, have changed commerce and transactions. Everyone has at least one, emblazoned with pictures or scenery or ju
57 views0 comments
echoudhury77
- Feb 26, 2019
- 3 min
When Your IT Support Company Gets Hacked
Sometimes you see something in the Dark Web that looks like an anomaly...
7 views0 comments
echoudhury77
- Jan 26, 2019
- 4 min
So your e-mail was hacked
We live in a very digital world with constant contact in real-time through social media, SMS, and e-mail. Without a doubt, it's an exciting
13 views0 comments
bottom of page