HTG Weekly Blog

 

#becybersmart (3)

2 min read

The Demand for Cyber Insurance has Skyrocketed

The demand for cyber insurance has skyrocketed in the last few years. The business, currently valued at $7.8 billion, is predicted to grow to $20...

Read More

2 min read

Effective Cybersecurity Awareness Training

Likely during work hours, you have gone through the cybersecurity awareness training modules provided by your employer. You might have hoped to pass...

Read More

1 min read

CISA Creates the Election Security Risk Profile Tool

The Joint Cyber Defense Collaborative (JCDC) and CISA collaborated to create the "Protecting U.S. Elections: A CISA Cybersecurity Toolkit," which...

Read More

2 min read

With New Threats Around the Globe, Cybersecurity is a Necessity

We are privileged to be living in a time where technology and science can aid us, and make our lives much easier and more efficient. The technology...

Read More

3 min read

Staying Cyber-Safe While Traveling

After two years of working from the spare bedroom converted office, many of us are hoping for more travel in 2022; business, leisure, both. Of...

Read More

2 min read

Mitigate the Risks of Business Email Compromise Attacks

We know you've seen the headlines: Cyberattacks are hitting enterprises at unprecedented rates. And business email compromise (BEC) attacks, in...

Read More

1 min read

Cloud Services Can Be a Challenge for SMBs

Small to mid-sized businesses (SMBs) are turning to the cloud for numerous reasons.

Read More

2 min read

Making Authentication the Core of Email Security

The Zero Trust model is founded on a simple concept, "trust no one and nothing." In practical terms, organizations that adopt the Zero Trust model...

Read More

2 min read

Five Tips for Keeping Your Mobile Data Safe and Secure

Mobile security should be a top priority for any smartphone user. Phones have quickly evolved in recent years to store and share our most sensitive...

Read More

2 min read

Public Wi-Fi Can Make You Vulnerable to Hackers

The same features that make free Wi-Fi hotspots desirable for consumers make them desirable for hackers, namely, that it requires no authentication...

Read More