Small businesses NEED to take cybersecurity seriously. We can’t stress this enough—it doesn’t matter what industry you are in, it doesn’t...
Reciprocal Technologies Blog Security • Page 15
3 Statistics to Help Shape Your Business’ Cybersecurity
We know it’s not pleasant to think about your organization succumbing to a cybersecurity attack, but it’s a very realistic event that you have to be...
What Happens When a Raven Goes Phishing?
What if Edgar Allan Poe wrote “The Raven” during the information age? Once upon a midnight dreary, while I emailed, weak and weary,Over many a...
Keep Access Secure with a Router Password Repository
If you have ever forgotten your wireless router’s password, then you know that a factory reset might be imminent—assuming of course that you have...
Understanding How You Get Malware will Help You Avoid It
Malware has plagued anyone using technology for a long time, and while security has certainly gone a long way toward protecting users from malware,...
The No More Ransom Initiative is Helping Organizations Deal with Ransomware
Ransomware is an incredibly potent threat that has ravaged the cybersecurity landscape for several years now. Many users who get struck by...
USB Drives Carry a Lot of Business Risk in a Tiny Package
There’s nothing more intriguing than finding a random USB drive while cleaning up your office or while out and about. You might feel the urge to...
The Zeppelin Group is Making Us Ramble On About Ransomware
We apologize for the pun, but we couldn’t help ourselves. When you go about your business and attempt to onboard a new client or implement a new...
Considering LastPass’ Breach, Should Password Managers Be Trusted?
It’s been about a month since LastPass—one of the most well-known and popular password managers out there—suffered a security breach where attackers...
Improve Privacy By Managing App Location
Mobile devices have cemented themselves in day-to-day life, so much so that people feel uncomfortable when they don’t know where their smartphone is...