Honestly, it shouldn’t be surprising that 2020 has come to an end with news of a massive cyberespionage attack—the biggest ever, as a matter of...
Reciprocal Technologies Blog Security • Page 24
Let’s Take a Look at Phishing Attacks
Phishing attacks are growing in number and it presents a major challenge for businesses. The many different forms that these attacks come in just...
Holiday Shopping Looking Different this Year
2020’s holiday season is going to be much like the rest of 2020: distanced. Most people are taking precautions and therefore have put the kibosh on...
Two Lessons Businesses Can Learn from the Spotify Data Discovery
Every so often, we come across a bit of news that helps to teach not one, but two cybersecurity best practices at the same time. With the recent...
Update Google Chrome, Says Homeland Security
Look, we get it… it’s one thing to hear it from “those IT guys” about how important software updates are. We’re into this stuff, after all, so we...
How to Ensure Your Remote Workforce Isn’t Making You Vulnerable
Considering the current popularity of remote operations, the security of your business’ resources should be one of your greatest concerns. While...
Is Remote Work a Bigger Risk with Certain Employees?
Despite all that has gone on, many businesses have managed to stay open by embracing the remote capabilities of today’s technology. This is...
When Your Contacts Aren’t Your Contacts – Display Name Spoofing
Business success is often tied to the quality of your business relationships. There are a lot of people you need to trust: your vendors to get you...
Tip of the Week: 6 Data Security Practices You Can Take
Data is one of the most valuable assets there is today, which is why any business should consider its security a prerogative. This can admittedly be...
Keep Your Business Safe with These Best Practices
Security has to be a priority for your business. Oftentimes there is a disconnect between those aims and the practices used by businesses. This gap...