Cybersecurity

Decoding Key Cybersecurity Acronyms โ€“ How Many Do You Know?

Every industry has its own lingo, and the technology sector is no different โ€“ in fact, itโ€™s flooded with acronyms. As the necessity for prioritizing cybersecurity increases so does the need to become familiar with its terminology. No need to subtly search tech terms on your phone during your next meeting. Weโ€™ve created a list […]

Decoding Key Cybersecurity Acronyms โ€“ How Many Do You Know? Read More ยป

IronEdge Group discusses the Windows MSHTML zero day exploit

Zero-Day Exploits โ€“ The Latest Form of Cyberattack?

2021 has been record-breaking year for cybercrime and it shows no signs of slowing down. This month another company fell victim to a cyberattack, this time in the form of a zero-day exploit. On Tuesday, September 7, Microsoft discovered a zero-day vulnerability in its MSHTML Platform, referred to as CVE-2021-40444. This highly sophisticated form of

Zero-Day Exploits โ€“ The Latest Form of Cyberattack? Read More ยป

Top 5 Cybersecurity Breaches in Texas History

Throughout the years, there have been numerous cybersecurity breaches in the state of Texas. Varying in size and the damage that they caused (both financially and to the establishmentโ€™s reputation), they have shaped the way that the government and businesses deal with cyber attacks.  Due to recent attacks, local officials are frequently encouraging Texas businesses

Top 5 Cybersecurity Breaches in Texas History Read More ยป

Why Your Employees Are A Cyber Criminal’s Primary Target

Some companies may assume that external threats are the most important problem that they need to protect against when it comes to cybersecurity. However,  60 percent of data breaches are caused by internal actors. In fact, insider cybersecurity threats have grown by 47 percent since 2018.    Why Employees Become Cyber Criminal Targets Employees may

Why Your Employees Are A Cyber Criminal’s Primary Target Read More ยป

Construction Workers with Plans

Mitigating General Contractorsโ€™ IT Risks with Business Continuity

As a General Contractor in the digital age, you rely heavily on information technology to run your business. From VoIP phone systems and hosted email for basic communications, to cloud-based file sharing solutions for sharing design plans between engineering and on-site project managers – itโ€™s no wonder then why operations come screeching to a halt

Mitigating General Contractorsโ€™ IT Risks with Business Continuity Read More ยป

27 Million Spam Messages Earns Man the Title of โ€œSpam King,โ€ and 2.5 Years in Prison

The man who, between 2008 and 2009, stole the log-in credentials of Facebook users to spread his credential-stealing web links, has been sentenced to some hard time. Sanford Wallace, a habitual spammer with a long history of spreading the irritating garbage to unwilling recipients, will be spending two and a half years in prison in

27 Million Spam Messages Earns Man the Title of โ€œSpam King,โ€ and 2.5 Years in Prison Read More ยป