TAP Into Technology Blog: IT Security (14)
Cybersecurity Threat Breakdown [Marriott + HSBC]
With years of experience in the technology industry, headlines about cyber attacks and data breaches stand out to me. Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share...
Bypass vs Failsafe: What's the Difference?
Computer networking terminology can become overly fickle once vendor products get into the mix. To help alleviate some confusion, we’re going to go over some common terms that often throw customers for a loop and hopefully clear up some...
Advanced Persistent Threat Activity Exploiting Managed Service Providers
The National Cybersecurity and Communications Integration Center has been tracking attacks on global Managed Service Providers (MSP) from Advanced Persistent Threat actors since 2016. Targets of these attacks spread across Information...
The Smarter Things Network TAPs Do to Make Your Security Program Stronger
Make no mistake – securing your organization from outside cyber threats is one of the most difficult and challenging aspects of IT. In all likelihood, attackers are continually probing your network, seeking passwords, vulnerabilities or...
Cybersecurity Threat Breakdown [Ohio Hospital System + USPS]
With years of experience in the technology industry, headlines about cyber attacks and data breaches stand out to me. Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share...
Cybersecurity Threat Breakdown [Cathay Pacific + Pentagon]
Here’s your monthly roundup of the latest hacks and data breaches around the world. In this monthly series, I’ll share information and updates on the most recent hacks that I saw in the news, including causes, resolutions, and what you can...