KEY POINTS A November 2020 report by GlobeNewswire reported that there was a 27.1% increase in VPN usage in 2020.… Read more What Should Be Considered When Choosing a Corporate VPN?

KEY POINTS A November 2020 report by GlobeNewswire reported that there was a 27.1% increase in VPN usage in 2020.… Read more What Should Be Considered When Choosing a Corporate VPN?
KEY POINTS A 2020 report by SurfShark identified that 31% of internet users around the world have used a VPN… Read more Do Free VPNs Collect Your Data?
KEY POINTS Gartner estimates that by 2025, 90% of organizations that fail to control public cloud use will inadvertently share… Read more What Is Cloud Information Security?
KEY POINTS With over 1.8 billion users worldwide as of 2020, Gmail is the worlds most popular email platform. Researcher… Read more What Is the Point of Purchasing an Old Gmail Account?
KEY POINTS 99.9% of automated attacks were stopped in their track due to the effectiveness of two factor authentication (2FA)… Read more Keep It 100 Podcast EP 17| O’Mard Consulting with Jeremy O’Mard!
KEY POINTS A 2020 study conducted by Statista, a leading provider of market and consumer data, revealed that 72% of… Read more Where Can I Report Fake Casino Bonuses That Have Malware Links?
KEY POINTS Verizon’s 2019 Data Brach Investigation Report identified that 80% of hacking related data breaches were attributed to individuals… Read more How Students Can Responsibly Surf the Web!
KEY POINTS Phishing is a common method used to deploy malicious software on a victims machine. Verizon’s 2020 Data Breach… Read more Can You Get Hacked Through Google Drive?
KEY POINTS Cyberspace is widely considered to be the fifth domain of modern warfare, which also includes space, air, ground,… Read more How Does One Find out If a Cyber Attack Is a State-sponsored or a Private Attempt?
KEY POINTS Accenture notes that 85% of organizations have reported that they experienced phishing and social engineering attacks in 2019.… Read more What Is the Primary Purpose for Instituting a Security Awareness Program?