There are those that purport that updating your Content Management System (CMS) is one of the mo ...
What Is Fileless Ransomware?
BackgroundRansomware isn’t a new phenomenon. The concept of holding locked files for ransom ha ...
The Top 10 Hackers Arrested in 2017
Cyber criminals are rampant. Active on the dark web, hacking forums, or other platforms that fac ...
Two-Factor vs Multi-Factor Authentication
When the best online security practices are being discussed, there’s always someone that b ...
The Anatomy of a Blended Attack
What is a blended attack?Depending on the context, a blended attack can refer to two different thing ...
DDoS Protected Web Hosting
DDoS attacks can be frustrating for many website owners as hackers may aim to overwhelm a websit ...
Website Optimization Walkthrough: Getting Speed and Security Right From The Start
No need to compromise between speed and security The idea of building a website for the first ti ...
Partner Success Story: Jensen Computer Technologies
It goes without say that customers are everything. They are the backbone to any successful b ...
The Need to Analyze Your Blocked Traffic
We’ve all heard the statistics of the growing numbers of web threats and hacking attempts ...
What You Should Wanna Do About WannaCry
Is Wannacry making you want to cry? This past weekend hit the world like a pile of bricks as nea ...