Blog

SORT BY
Blog
Cyberhill News Digest #1

Log4j Java-based logging vulnerability and AWS outages

How to Prevent a Ransomware Attack

Ransomware is a type of malware used by threat actors to infect computers and encrypt computer files, until a ransom is paid. After the initial infection, ransomware will attempt to…

Are you vulnerable to a Cyberattack

In the U.S. a data breach costs a company on average $8.19 million.

Is your Cybersecurity Strategy Scalable 

Cybersecurity is like a house. The coding is the blueprint and mainframe of the house. The different rooms could be seen as different departments. Every room has a locked door that needs…

Digital Transformation and Cybersecurity go hand in hand

Many companies are starting to see the importance of implementing a digital transformation strategy. The reasoning behind implementing digital transformation could be for improved customer experience, workforce enablement, or one…

5 Tips on how to pick the right Cybersecurity Software Provider

Cybersecurity is an integral part of any business and picking the right provider is not easy. There are many things to consider when looking for a vendor. In order to…

5 benefits of SSO

Single Sign-On, or SSO for short, is becoming increasingly important as businesses now have larger pools of applications, the work force is becoming more globalized, and employees are working from…

Backup Cloud Data with On-Premise solutions

Are you okay having your whole work infrastructure including backs ups/ disaster recovery all being protected by a public cloud vendor?