top of page
MSPs: Safeguard Your Reputation and Prevent Data Breaches with HIPAA Compliance Training
As an MSP, one of your top priorities is ensuring the security of your clients' data. If you have clients in the healthcare industry,...
What is Multi-factor Authentication?
Multi-factor authentication (MFA) is a security measure that requires you to provide more than one method of identification when...
The Dangers of Online Romance Scams
Online dating has made it easier than ever to meet new people, but it's also made it easier for scammers to take advantage of...
Security Awareness Training Framework for Cyber Insurance
Cyber insurance plays a key role in managing and reducing cyber risk. As cybercrime becomes more common and costly every day, the cyber...
AI’s Impact on the Threat Landscape in 2023 | Webinar
HacWare Channel Chief, Juan Fernandez and Quickpass Cybersecurity VP or Revenue, Jimmy Hatzell discuss the current threat landscape and...
How private is incognito mode?
When you're in "incognito" or "private" mode on your browser, you may not be as undercover as you thought. While your browser may not be...
How to keep your data secure when using public Wi-Fi
1 in 4 Wi-Fi hotspots are unsecured — this could include the networks you use at coffee shops, airports or any other public Wi-Fi you...
What hackers can find in your photo's metadata
Did you know that data your phone could be storing metadata (data about data) in the photos you take and share? This could include: The...
5 Rules for Phishing Reporter Analysis: How to scan emails for phishing or malicious content?
Review the Email Header. In Outlook, select "View message details" to see the raw email. In Gmail, select "Show original"
5 Tips for Strong Password Security
Weak passwords play a part in over 80% of hacking related breaches. Paying attention to your end-users’ password management, including...
Best Practices for LastPass Password Management
LastPass Security Breach Password management is certainly not a new topic, but in the light of recent cyber attacks, especially to...
How to Protect your Computer from Malware
With malware, prevention is better than cure. Some malware are extremely difficult to find let alone to remove. As a user, your focus...
bottom of page