Blockchain has been an especially hot topic as of late, especially with the recent meteoric rise in the value of most cryptocurrencies. With all the...
Reciprocal Technologies Blog Security • Page 33
Technology Basics: Encryption
Secrets need to be protected. That’s why humans created cryptography. Cryptography can be traced back to around the time the pharaohs ruled Egypt,...
A Close Examination of Cyberterrorism
Unfortunately, we’ve all been exposed to terrorism in one way or another. To avoid any confusion, when we reference terrorism, we’re talking about...
Access Control is Key to Your Business’ Security
Access control is an extremely useful way to manage a secure computing infrastructure, and one of the best ways your organization can protect...
More Victims of the Equifax Breach Discovered
The 2017 Equifax leak was a disastrous scenario, but recent revelations have discovered that even more victims were affected than was previously...
Encrypt and Protect Your Data with a VPN
If you’ve ever felt as though someone was watching what you were doing while you were working remotely, either at home or in public, there’s a...
Email Malware is the New Schrӧdinger’s Cat
There is a famous thought experiment devised by physicist Erwin Schrӧdinger, describing a very particular paradox in quantum physics through the...
When it Comes to Security, Two Factors are Better Than One
The password isn’t nearly as secure as it used to be. Hackers have begun to take advantage of extremely powerful solutions designed to brute force...
Tip of the Week: Protecting Your Mobile Device in 2 Easy Steps
Mobile devices are one of the greatest tools available for business use today. However, because society has come to rely so much on mobile devices,...
4 Resolutions to Keep Your Business Secure in 2018
With every new year comes great new opportunities, and 2018 is no different. However, change can be a good thing, and with a new year also comes...










