Security Attacks

Understanding the Internet of Things Security Vulnerabilities and Challenges

Internet of Things (IoT) devices utilize internet connectivity with embedded technology that allows them to be controlled remotely through computer interfaces giving rise to security vulnerabilities and challenges. With little…

Read Now

Build Your Cloud Security Program with Microsoft Secure Score

The latest Microsoft Intelligence Security Report shared some interesting statistics that had me thinking for several days. The report shows how businesses lose $1M per minute to cybercrime around the…

Read Now

Stay in Control of Your Critical Data

Recently, Facebook announced that a hacker stole login information for 50 million accounts, putting over 90 million users at risk for stolen information. In related news, Uber has reached an…

Read Now

The Meltdown and Spectre Vulnerabilities: Get the Lowdown

1/23/18 Update — Reports, patches, and updates are still coming forward. We are continuing to monitor the situation as it develops. Here are a few links to help keep you updated…

Read Now

The Top 6 Security Tips Employees Need To Know

When it comes to cyber security, especially phishing/spear phishing, what you don’t know (and/or ignore) can hurt you and your organization. The total annual cost of phishing for the average-sized…

Read Now

© 2022 CONNECTION, INC. ALL RIGHTS RESERVED.