Hacker Convention Warns: Don’t Allow Your Network to Be “Faxploited”

There are plenty of access points for a hacker, and they’re often tied to our very high-tech devices – all the pieces of hardware with “smart” in front of them for one example. But sometimes our dinosaurs, the work-horse predecessors of our fast-paced IT, are the ones holding open a back door for security weaknesses. At Def Con 26, an …

5 Network Security Pitfalls Putting You at Risk

Security is rightfully at the forefront of most business owners’ minds. There are new breaches reported on every day and no size business, from major enterprise to SMB, is safe from being targeted. There are many options for hardware and software that provide protection, but a network security policy is just as critical. Many times, though, we find that these …