KEEP IN TOUCH
Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!
What every Organization should know about the Accountability Obligation Every day, massive volumes of data are generated when consumers and businesses use the internet to conduct their business. Consumers are also becoming more skeptical about how businesses are utilizing and handling their personal data, and they place a higher value on trust and accountability than
13 phishing attack types and how to protect your business against them Phishing attacks have existed since the internet’s infancy. The earliest phishing attacks began in the mid-1990s, using AOL to collect passwords and credit card numbers. Today’s cybercriminals utilize increasingly sophisticated social engineering techniques. In essence, phishing is a social engineering attack that employs
Microsoft Now Lets you Enable the Windows App Installer Again, Here’s How Microsoft now allows enterprise admins to re-enable the MSIX ms-appinstaller protocol handler disabled after Emotet abused it to deliver malicious Windows App Installer packages. App Installer (also known as AppX Installer) allows users to install Windows applications directly from a web server using