Businesses often prioritize different parts of their operations. Some focus on security while others focus on business continuity, even though both...
Reciprocal Technologies Blog Security • Page 19
Are Ethical Hackers the New Defense Against Cybercrime for Small Businesses?
While considering cybercrime, it’s very easy to slip into a dichotomy: hackers are bad, while not-hackers are good. Like most things in life,...
IoT Attacks Are Making Network Security Difficult
There are a lot of “smart” devices out there—over 35 billion and counting—and more and more are being connected to the Internet all the time. These...
ALERT: Log4j is the Worst Cybersecurity News in a Long Time
Have you heard of Log4j? If we asked you a week ago, you almost certainly did not. Now it is dominating headlines as one of the largest...
Sometimes Open-Source Software Causes Problems
Some businesses struggle to obtain the appropriate software solutions, especially if they are on a budget. Some even choose to take advantage of...
Scammers Targeting Amazon Users
It’s the holiday season, and with it comes a multitude of hackers trying to cash in on everyone’s online purchases. These phishing scams always...
4 Tools Any Business Can Use to Improve Security
Network security is not the easiest thing to implement for your business, and you definitely need someone trained in this topic to be the one behind...
Identifying Errors in Phishing Emails can Save Your Bacon
Phishing scams have been around for a long time, and they have only grown more convincing and more dangerous. Some businesses can’t even tell the...
VPNs Are Under Attack. Here’s What You Need to Know
With the massive shift toward remote and hybrid work, many companies have implemented virtual private networks to facilitate a more secure working...
U.S. Government Taking Steps Toward Protecting Data
Do you remember the series of high-profile infrastructure attacks that occurred not so long ago this year? Well, now the United States government is...










