Generous cybersecurity grants are available to local governments across Kentucky—but you need to apply immediately. Here’s what to do next.
Companies must take cybersecurity more seriously than ever before after a new rule passed by the SEC. Here’s your primer to get ready and keep compliant.
Most of us wouldn't think twice about using a public charging station, but you could be putting yourself at risk. Here's what you should know to protect yourself and your data from bad actors.
Healthcare organizations face a number of cyber threats. That's why it's crucial that you are proactive in mitigating risk, safeguarding your valuable data, and protecting your reputation,
Implementing the updated PCI DSS 4.0 requirements is crucial for organizations to protect credit card data from unauthorized access. Dean Dorton team members are experts on the guidelines you should follow to keep your organization secure.
MFA is a key aspect of cybersecurity for business as well as personal use, but it is not the cure-all that it once was. Here's what else you can do to keep your data secure.
Cyber security is always evolving and the days of installing a standard antivirus (AV) and being worry free are over. This article explores why a simple AV isn't enough to protect your information in today's threat environment.
The Gramm-Leach-Bliley Act (GLBA) has been around for years, but only had a real impact on colleges and universities for the last 3 to 4 years. Like any cybersecurity program, data security laws have a need to evolve and adapt to changing threats.
As more organizations have expanded their internet presence, web application attacks have become increasingly profitable for threat actors. Recent vulnerabilities such as Log4j have also brought more intense scrutiny to web applications.
Dean Dorton’s Cyber Security Team has observed an uptick in callback phishing attacks that impersonate PayPal, McAfee, CrowdStrike, and various other platforms. What can your business do to defend itself from this growing threat?