Close

Security

Ransomware Attacks: 20 Essential Considerations For Prep And Response

“ Establishing risk management processes is often overlooked. Having a workflow everyone—including members of the C-suite—is trained on helps limit the complexities of ransomware attacks. When you’re attacked, it’s all about time, limitation and response. Too often, the process takes too long, with not enough limits and either an overreaction or underreaction to the situation. […]

Read More...

14 Expert Tips For Choosing A Secure Messaging App

“ Look for open-source and end-to-end encryption. The most popular options are Signal and Wickr. I prefer Wickr because of the company’s mission statement and longevity in the space. Knowing that the source can be independently reviewed is massively important. It’s also important that the end-to-end encryption is designed in a way that makes use […]

Read More...