The costs associated with security breaches tend to be a bit of an enigma. But the data gathered over the last 10 years paints an increasingly clear, and scary picture.
computer security
What is Email Spoofing? (And how does it work?)
Email spoofing is something often used by hackers in successful phishing campaigns. Today we learn what it is and how to protect your businesses reputation against it.
New Cybersecurity Grant Program Aims to Boost Local Government Security
Last week, DHS announced a new program for states and local towns/counties to beef up their cybersecurity stance. We look at the details of the program and what to expect.