Ransomware has been far from low-profile since its inception several years ago. Everyone knows what the file-encrypting malware does, and they all...
Reciprocal Technologies Blog Security • Page 30
A Look at this Year’s Worst Cybercrimes
It’s fair to say that today's organizations are faced with more online threats than ever before. To properly manage the information systems that...
Scam Claims to Have Compromising Video… of You
Every business (and every individual, for that matter) needs to be wary of Internet scams and other online tricks. This is because those scammers...
Your Emails Won’t Be Secure Without these Safeguards
Are your employees putting your organization’s security at risk due to poor email practices? This is a question that all business owners need to...
Surveying the Damage of Meltdown and Spectre
At the time of this writing, it has only been about a half a year since the Meltdown and Spectre exploits became public knowledge. Fortunately,...
Will Your Online Privacy Be Better Using Blockchain?
Blockchain has been an especially hot topic as of late, especially with the recent meteoric rise in the value of most cryptocurrencies. With all the...
A Close Examination of Cyberterrorism
Unfortunately, we’ve all been exposed to terrorism in one way or another. To avoid any confusion, when we reference terrorism, we’re talking about...
How to Identify If an Email is a Security Risk
There’s one major reason why email is the preferred method of spreading threats like ransomware and other types of malicious software. The sheer...
More Victims of the Equifax Breach Discovered
The 2017 Equifax leak was a disastrous scenario, but recent revelations have discovered that even more victims were affected than was previously...
Take These Steps to Make IT Security Top of Mind
Here’s the thing about IT security: it requires a little more than a decent firewall and a reasonably-strong password. We talk a lot about how to...