Using email to trick users is something that hackers have done for ages, but they usually find themselves tucked away in the spam folder where they...
Reciprocal Technologies Blog Security • Page 1
Cybersecurity Will Get More Dicey in 2022
All businesses must make securing their infrastructures and reinforcing cybersecurity practices a priority, especially as we move into the new year....
Choosing How to Protect Your Business Doesn’t Have to Be a Hard Decision
Businesses often prioritize different parts of their operations. Some focus on security while others focus on business continuity, even though both...
Are Ethical Hackers the New Defense Against Cybercrime for Small Businesses?
While considering cybercrime, it’s very easy to slip into a dichotomy: hackers are bad, while not-hackers are good. Like most things in life,...
IoT Attacks Are Making Network Security Difficult
There are a lot of “smart” devices out there—over 35 billion and counting—and more and more are being connected to the Internet all the time. These...
ALERT: Log4j is the Worst Cybersecurity News in a Long Time
Have you heard of Log4j? If we asked you a week ago, you almost certainly did not. Now it is dominating headlines as one of the largest...
Sometimes Open-Source Software Causes Problems
Some businesses struggle to obtain the appropriate software solutions, especially if they are on a budget. Some even choose to take advantage of...
Scammers Targeting Amazon Users
It’s the holiday season, and with it comes a multitude of hackers trying to cash in on everyone’s online purchases. These phishing scams always...
4 Tools Any Business Can Use to Improve Security
Network security is not the easiest thing to implement for your business, and you definitely need someone trained in this topic to be the one behind...
Identifying Errors in Phishing Emails can Save Your Bacon
Phishing scams have been around for a long time, and they have only grown more convincing and more dangerous. Some businesses can’t even tell the...