We trust that our medical records are safe and confidential, but what happens when they are accessed by an external
TOP STORIES

What is an Insider Threat? Definition and Examples
BY: JEFF PETTERS UPDATED: 9/22/2020 An insider threat is a security risk that originates within the targeted organization. This doesn’t mean

How Honeypots Unmask Hackers & Scammers Online
BY: KODY KINZIE UPDATED: 3/29/2020 A honeypot is a tool that acts as bait, luring an attacker into revealing themselves by

What is an IT Security Audit? The Basics
BY: JEFF PETTERS UPDATED: 3/29/2020 A security audit is the high-level description of the many ways organizations can test and assess

Top 5 Remote Work Security Threats
BY: JEFF PETTERS UPDATED: 8/12/2020 Suddenly cybersecurity teams have to adjust to the reality of a nearly 100% remote workforce. Security
Shopify’s Insider Threat
We all fear our data and information being breached from outside forces wanting to sell our client details to the

Supply Chain Security: Data Erasure’s Role When Purchasing IT Assets
Rising supply chain attacks mean organizations must tread carefully when buying IT—even from trusted suppliers. Data erasure can help. While

